{"id":"https://openalex.org/W3152624075","doi":"https://doi.org/10.1145/3445814.3446729","title":"Computing with time: microarchitectural weird machines","display_name":"Computing with time: microarchitectural weird machines","publication_year":2021,"publication_date":"2021-04-11","ids":{"openalex":"https://openalex.org/W3152624075","doi":"https://doi.org/10.1145/3445814.3446729","mag":"3152624075"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3445814.3446729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087128492","display_name":"Dmitry Evtyushkin","orcid":"https://orcid.org/0000-0002-0549-0438"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dmitry Evtyushkin","raw_affiliation_strings":["College of William & Mary, USA"],"affiliations":[{"raw_affiliation_string":"College of William & Mary, USA","institution_ids":["https://openalex.org/I16285277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049123467","display_name":"Thomas S. Benjamin","orcid":"https://orcid.org/0000-0002-9758-0712"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Benjamin","raw_affiliation_strings":["Perspecta Labs, USA"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020417025","display_name":"Jesse Elwell","orcid":"https://orcid.org/0000-0001-6679-1624"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jesse Elwell","raw_affiliation_strings":["Perspecta Labs, USA"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078441404","display_name":"Jeffrey A. Eitel","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffrey A. Eitel","raw_affiliation_strings":["Perspecta Labs, USA"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007964772","display_name":"Angelo Sapello","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Angelo Sapello","raw_affiliation_strings":["Perspecta Labs, USA"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109224190","display_name":"Abhrajit Ghosh","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhrajit Ghosh","raw_affiliation_strings":["Perspecta Labs, USA"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs, USA","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.674,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.850408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":81},"biblio":{"volume":"12","issue":null,"first_page":"758","last_page":"772"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.67389536},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.47851694},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41583955}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8550049},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.67389536},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.5320127},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.52418154},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5009978},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.49709323},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.49655634},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.47851694},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4534949},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.44044295},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41583955},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3254035},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26236245},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23058152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21307752},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3445814.3446729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":58,"referenced_works":["https://openalex.org/W109909280","https://openalex.org/W1545927878","https://openalex.org/W1557018311","https://openalex.org/W1581442032","https://openalex.org/W1592879244","https://openalex.org/W1823377586","https://openalex.org/W1831864456","https://openalex.org/W1964241047","https://openalex.org/W1990649188","https://openalex.org/W2009801020","https://openalex.org/W2023035194","https://openalex.org/W2034711041","https://openalex.org/W2060692877","https://openalex.org/W2061438988","https://openalex.org/W2062340141","https://openalex.org/W2089745089","https://openalex.org/W2104182023","https://openalex.org/W2112731379","https://openalex.org/W2114895548","https://openalex.org/W2123553986","https://openalex.org/W2123596153","https://openalex.org/W2126047957","https://openalex.org/W2128180740","https://openalex.org/W2131523719","https://openalex.org/W2136245903","https://openalex.org/W2150118230","https://openalex.org/W2151135920","https://openalex.org/W2158237156","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2166462894","https://openalex.org/W2188582538","https://openalex.org/W2308109111","https://openalex.org/W2314464932","https://openalex.org/W2507765405","https://openalex.org/W2518060702","https://openalex.org/W2564856904","https://openalex.org/W2602229646","https://openalex.org/W2767816403","https://openalex.org/W2780532113","https://openalex.org/W2783112941","https://openalex.org/W2791034507","https://openalex.org/W2793135307","https://openalex.org/W2884530475","https://openalex.org/W2890909432","https://openalex.org/W2912742709","https://openalex.org/W2947949043","https://openalex.org/W2952322674","https://openalex.org/W2954241526","https://openalex.org/W2964281551","https://openalex.org/W2964590009","https://openalex.org/W2976763854","https://openalex.org/W2978325751","https://openalex.org/W2990246449","https://openalex.org/W3015465581","https://openalex.org/W3016511751","https://openalex.org/W4242926647","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W74995240","https://openalex.org/W4304141708","https://openalex.org/W3152624075","https://openalex.org/W3091114510","https://openalex.org/W3043723866","https://openalex.org/W3028585056","https://openalex.org/W2294107011","https://openalex.org/W2208396577","https://openalex.org/W2182180023","https://openalex.org/W2060012464"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1],"such":[2,70,79,152],"as":[3,71,83,93],"Spectre":[4],"rely":[5],"on":[6,102,110],"properties":[7],"of":[8,14,19,33,40,62,78,170,195,207],"modern":[9],"CPUs":[10],"that":[11,36,55,120,153,210,219],"permit":[12],"discovery":[13],"microarchitectural":[15],"state":[16,169],"via":[17],"timing":[18,84],"various":[20],"operations.":[21],"The":[22,76],"Weird":[23,50],"Machine":[24],"concept":[25],"is":[26,157,182],"an":[27,160],"increasingly":[28],"popular":[29],"model":[30],"for":[31],"characterization":[32],"emergent":[34],"execution":[35,206],"arises":[37],"from":[38],"side-effects":[39],"conventional":[41,106],"computing":[42],"constructs.":[43],"In":[44],"this":[45],"work":[46],"we":[47,144,197],"introduce":[48],"Microarchitectural":[49],"Machines":[51],"(\u00b5WM):":[52],"code":[53,151,175],"constructions":[54],"allow":[56],"performing":[57],"computation":[58,99,129],"through":[59],"the":[60,167,171,174,180,184,193,202],"means":[61],"side":[63],"effects":[64],"and":[65,74,114,187,204,216],"conflicts":[66],"between":[67],"microarchitectual":[68],"entities":[69],"branch":[72],"predictors":[73],"caches.":[75],"results":[77],"computations":[80],"are":[81],"observed":[82],"variations.":[85],"We":[86,118,136],"demonstrate":[87,119,198],"how":[88],"\u00b5WMs":[89,121],"can":[90,122],"be":[91,123],"used":[92,124],"a":[94,132,139,146,177,208,212,217,221],"powerful":[95],"obfuscation":[96,196],"engine":[97],"where":[98],"operates":[100],"based":[101,109],"events":[103],"unobservable":[104],"to":[105,125,148,159,165],"anti-obfuscation":[107],"tools":[108],"emulation,":[111],"debugging,":[112],"static":[113],"dynamic":[115],"analysis":[116],"techniques.":[117],"reliably":[126],"perform":[127],"arbitrary":[128],"by":[130],"implementing":[131],"SHA-1":[133],"hash":[134],"function.":[135],"then":[137],"present":[138],"practical":[140],"example":[141],"in":[142,201],"which":[143],"use":[145,200],"\u00b5WM":[147],"obfuscate":[149],"malware":[150,185],"its":[154,189,199],"passive":[155],"operation":[156],"invisible":[158],"observer":[161],"with":[162],"full":[163],"power":[164],"view":[166],"architectural":[168],"system":[172],"until":[173],"receives":[176],"trigger.":[178],"When":[179],"trigger":[181],"received":[183],"decrypts":[186],"executes":[188],"payload.":[190],"To":[191],"show":[192],"effectiveness":[194],"concealment":[203],"subsequent":[205],"payload":[209,218],"exfiltrates":[211],"shadow":[213],"password":[214],"file,":[215],"creates":[220],"reverse":[222],"shell.":[223]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3152624075","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-01-20T11:21:02.725462","created_date":"2021-04-26"}