A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2005.10333
Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Randomization (ASLR) and Kernel ASLR(KASLR). They play pronounced roles when the security of sandboxed applications such as Web-browser are considered.Armed with arbitrary write access in the kernel memory, if these protections are bypassed, an adversary could find a suitable where to write in order to get an elevation of privilege or code execution in ring 0. In this paper, we introduce a reliable method based on Transactional Synchronization Extensions (TSX) side-channel leakage to reveal the address of the Global Descriptor Table (GDT) and Interrupt Descriptor Table (IDT). We indicate that by detecting these addresses, one could execute instructions to sidestep the Intels User-Mode InstructionPrevention (UMIP) and the Hypervisor-based mitigation and, consequently, neutralized them. The introduced method is successfully performed after the most recent patches for Meltdown and Spectre. Moreover, the implementation of the proposed approach on different platforms, including the latest releases of Microsoft Windows, Linux, and, Mac OSX with the latest 9th generation of Intel processors, shows that the proposed mechanism is independent from the Operating System implementation. We demonstrate that a combinationof this method with call-gate mechanism (available in modernprocessors) in a chain of events will eventually lead toa system compromise despite the limitations of a super-secure sandboxed environment in the presence of Windows proprietary Virtualization Based Security (VBS). Finally, we suggest the software-based mitigation to avoid these issues with an acceptable overhead cost.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2005.10333
- https://arxiv.org/pdf/2005.10333
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4394655181
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4394655181Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2005.10333Digital Object Identifier
- Title
-
A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-ChannelWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-05-20Full publication date if available
- Authors
-
Mohammad Sina Karvandi, Saleh Khalaj Monfared, Mohammad Sina Kiarostami, Dara Rahmati, Saeid GorginList of authors in order
- Landing page
-
https://arxiv.org/abs/2005.10333Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2005.10333Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2005.10333Direct OA link when available
- Concepts
-
Table (database), Channel (broadcasting), Computer science, Mathematics, Data mining, TelecommunicationsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4394655181 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2005.10333 |
| ids.doi | https://doi.org/10.48550/arxiv.2005.10333 |
| ids.openalex | https://openalex.org/W4394655181 |
| fwci | |
| type | preprint |
| title | A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10054 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.859000027179718 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Parallel Computing and Optimization Techniques |
| topics[1].id | https://openalex.org/T11269 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.8478999733924866 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Algorithms and Data Compression |
| topics[2].id | https://openalex.org/T10317 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.8149999976158142 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Advanced Database Systems and Queries |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C45235069 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6484469771385193 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q278425 |
| concepts[0].display_name | Table (database) |
| concepts[1].id | https://openalex.org/C127162648 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5067360997200012 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q16858953 |
| concepts[1].display_name | Channel (broadcasting) |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.4851139783859253 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C33923547 |
| concepts[3].level | 0 |
| concepts[3].score | 0.32328036427497864 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[3].display_name | Mathematics |
| concepts[4].id | https://openalex.org/C124101348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.21648317575454712 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[4].display_name | Data mining |
| concepts[5].id | https://openalex.org/C76155785 |
| concepts[5].level | 1 |
| concepts[5].score | 0.14180275797843933 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[5].display_name | Telecommunications |
| keywords[0].id | https://openalex.org/keywords/table |
| keywords[0].score | 0.6484469771385193 |
| keywords[0].display_name | Table (database) |
| keywords[1].id | https://openalex.org/keywords/channel |
| keywords[1].score | 0.5067360997200012 |
| keywords[1].display_name | Channel (broadcasting) |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.4851139783859253 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/mathematics |
| keywords[3].score | 0.32328036427497864 |
| keywords[3].display_name | Mathematics |
| keywords[4].id | https://openalex.org/keywords/data-mining |
| keywords[4].score | 0.21648317575454712 |
| keywords[4].display_name | Data mining |
| keywords[5].id | https://openalex.org/keywords/telecommunications |
| keywords[5].score | 0.14180275797843933 |
| keywords[5].display_name | Telecommunications |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2005.10333 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2005.10333 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2005.10333 |
| locations[1].id | doi:10.48550/arxiv.2005.10333 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2005.10333 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5021846368 |
| authorships[0].author.orcid | https://orcid.org/0009-0007-5810-4549 |
| authorships[0].author.display_name | Mohammad Sina Karvandi |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mohammad Sina Karvandi |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5021442954 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-5369-5270 |
| authorships[1].author.display_name | Saleh Khalaj Monfared |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Saleh Khalaj Monfared |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5052219877 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6100-6567 |
| authorships[2].author.display_name | Mohammad Sina Kiarostami |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohammad Sina Kiarostami |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5043762973 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-0104-4016 |
| authorships[3].author.display_name | Dara Rahmati |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Dara Rahmati |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5032446883 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-5898-4872 |
| authorships[4].author.display_name | Saeid Gorgin |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Saeid Gorgin |
| authorships[4].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2005.10333 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2024-04-11T00:00:00 |
| display_name | A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10054 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.859000027179718 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Parallel Computing and Optimization Techniques |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W4391375266, https://openalex.org/W1979597421, https://openalex.org/W2007980826, https://openalex.org/W2061531152, https://openalex.org/W3002753104, https://openalex.org/W2077600819, https://openalex.org/W2142036596, https://openalex.org/W2072657027, https://openalex.org/W2600246793 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2005.10333 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2005.10333 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2005.10333 |
| primary_location.id | pmh:oai:arXiv.org:2005.10333 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2005.10333 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2005.10333 |
| publication_date | 2020-05-20 |
| publication_year | 2020 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 67, 91, 202, 213, 227 |
| abstract_inverted_index.0. | 85 |
| abstract_inverted_index.In | 86 |
| abstract_inverted_index.We | 117, 199 |
| abstract_inverted_index.an | 63, 76, 252 |
| abstract_inverted_index.as | 26, 46 |
| abstract_inverted_index.by | 22, 120 |
| abstract_inverted_index.if | 58 |
| abstract_inverted_index.in | 1, 54, 72, 83, 210, 212, 231 |
| abstract_inverted_index.is | 19, 146, 192 |
| abstract_inverted_index.of | 42, 78, 106, 161, 172, 184, 215, 226, 234 |
| abstract_inverted_index.on | 95, 165 |
| abstract_inverted_index.or | 8, 80 |
| abstract_inverted_index.to | 70, 74, 102, 128, 247 |
| abstract_inverted_index.we | 89, 242 |
| abstract_inverted_index.9th | 182 |
| abstract_inverted_index.Mac | 177 |
| abstract_inverted_index.OSX | 178 |
| abstract_inverted_index.The | 143 |
| abstract_inverted_index.and | 32, 112, 135, 156 |
| abstract_inverted_index.are | 48, 61 |
| abstract_inverted_index.for | 154 |
| abstract_inverted_index.get | 75 |
| abstract_inverted_index.one | 124 |
| abstract_inverted_index.out | 21 |
| abstract_inverted_index.the | 10, 14, 40, 55, 104, 107, 130, 136, 150, 159, 162, 169, 180, 189, 195, 224, 232, 244 |
| abstract_inverted_index.toa | 220 |
| abstract_inverted_index.They | 35 |
| abstract_inverted_index.This | 18 |
| abstract_inverted_index.and, | 139, 176 |
| abstract_inverted_index.code | 81 |
| abstract_inverted_index.find | 66 |
| abstract_inverted_index.from | 194 |
| abstract_inverted_index.lead | 219 |
| abstract_inverted_index.most | 151 |
| abstract_inverted_index.play | 36 |
| abstract_inverted_index.ring | 84 |
| abstract_inverted_index.such | 25, 45 |
| abstract_inverted_index.that | 119, 188, 201 |
| abstract_inverted_index.this | 87, 204 |
| abstract_inverted_index.when | 39 |
| abstract_inverted_index.will | 217 |
| abstract_inverted_index.with | 50, 179, 206, 251 |
| abstract_inverted_index.(GDT) | 111 |
| abstract_inverted_index.(TSX) | 99 |
| abstract_inverted_index.Based | 238 |
| abstract_inverted_index.Intel | 185 |
| abstract_inverted_index.Space | 28 |
| abstract_inverted_index.Table | 110, 115 |
| abstract_inverted_index.after | 149 |
| abstract_inverted_index.avoid | 248 |
| abstract_inverted_index.based | 94 |
| abstract_inverted_index.chain | 214 |
| abstract_inverted_index.cost. | 255 |
| abstract_inverted_index.could | 65, 125 |
| abstract_inverted_index.limit | 9 |
| abstract_inverted_index.order | 73 |
| abstract_inverted_index.roles | 38 |
| abstract_inverted_index.shows | 187 |
| abstract_inverted_index.them. | 142 |
| abstract_inverted_index.these | 59, 122, 249 |
| abstract_inverted_index.where | 69 |
| abstract_inverted_index.write | 52, 71 |
| abstract_inverted_index.(ASLR) | 31 |
| abstract_inverted_index.(IDT). | 116 |
| abstract_inverted_index.(UMIP) | 134 |
| abstract_inverted_index.(VBS). | 240 |
| abstract_inverted_index.Global | 108 |
| abstract_inverted_index.Intels | 131 |
| abstract_inverted_index.Kernel | 33 |
| abstract_inverted_index.Layout | 29 |
| abstract_inverted_index.Linux, | 175 |
| abstract_inverted_index.System | 197 |
| abstract_inverted_index.access | 13, 53 |
| abstract_inverted_index.events | 216 |
| abstract_inverted_index.issues | 250 |
| abstract_inverted_index.kernel | 56 |
| abstract_inverted_index.latest | 170, 181 |
| abstract_inverted_index.method | 93, 145, 205 |
| abstract_inverted_index.paper, | 88 |
| abstract_inverted_index.recent | 152 |
| abstract_inverted_index.reveal | 103 |
| abstract_inverted_index.system | 221 |
| abstract_inverted_index.Address | 27 |
| abstract_inverted_index.Windows | 235 |
| abstract_inverted_index.address | 105 |
| abstract_inverted_index.despite | 223 |
| abstract_inverted_index.execute | 126 |
| abstract_inverted_index.kernels | 15 |
| abstract_inverted_index.leakage | 101 |
| abstract_inverted_index.memory, | 57 |
| abstract_inverted_index.patches | 153 |
| abstract_inverted_index.prevent | 7 |
| abstract_inverted_index.suggest | 243 |
| abstract_inverted_index.Finally, | 241 |
| abstract_inverted_index.Meltdown | 155 |
| abstract_inverted_index.Security | 239 |
| abstract_inverted_index.Spectre. | 157 |
| abstract_inverted_index.Windows, | 174 |
| abstract_inverted_index.approach | 164 |
| abstract_inverted_index.defenses | 24 |
| abstract_inverted_index.indicate | 118 |
| abstract_inverted_index.internal | 16 |
| abstract_inverted_index.numerous | 4 |
| abstract_inverted_index.overhead | 254 |
| abstract_inverted_index.presence | 233 |
| abstract_inverted_index.proposed | 163, 190 |
| abstract_inverted_index.releases | 171 |
| abstract_inverted_index.reliable | 92 |
| abstract_inverted_index.security | 41 |
| abstract_inverted_index.sidestep | 129 |
| abstract_inverted_index.suitable | 68 |
| abstract_inverted_index.systems, | 3 |
| abstract_inverted_index.Interrupt | 113 |
| abstract_inverted_index.Microsoft | 173 |
| abstract_inverted_index.Moreover, | 158 |
| abstract_inverted_index.Nowadays, | 0 |
| abstract_inverted_index.Operating | 196 |
| abstract_inverted_index.User-Mode | 132 |
| abstract_inverted_index.adversary | 64 |
| abstract_inverted_index.arbitrary | 51 |
| abstract_inverted_index.bypassed, | 62 |
| abstract_inverted_index.call-gate | 207 |
| abstract_inverted_index.detecting | 121 |
| abstract_inverted_index.different | 166 |
| abstract_inverted_index.elevation | 77 |
| abstract_inverted_index.execution | 82 |
| abstract_inverted_index.including | 168 |
| abstract_inverted_index.introduce | 90 |
| abstract_inverted_index.mechanism | 191, 208 |
| abstract_inverted_index.operating | 2 |
| abstract_inverted_index.performed | 148 |
| abstract_inverted_index.privilege | 79 |
| abstract_inverted_index.sandboxed | 43, 229 |
| abstract_inverted_index.user-mode | 11 |
| abstract_inverted_index.(available | 209 |
| abstract_inverted_index.Descriptor | 109, 114 |
| abstract_inverted_index.Extensions | 98 |
| abstract_inverted_index.acceptable | 253 |
| abstract_inverted_index.addresses, | 123 |
| abstract_inverted_index.compromise | 222 |
| abstract_inverted_index.eventually | 218 |
| abstract_inverted_index.generation | 183 |
| abstract_inverted_index.introduced | 144 |
| abstract_inverted_index.mechanisms | 6 |
| abstract_inverted_index.mitigation | 138, 246 |
| abstract_inverted_index.platforms, | 167 |
| abstract_inverted_index.pronounced | 37 |
| abstract_inverted_index.protection | 5 |
| abstract_inverted_index.Web-browser | 47 |
| abstract_inverted_index.demonstrate | 200 |
| abstract_inverted_index.environment | 230 |
| abstract_inverted_index.independent | 193 |
| abstract_inverted_index.limitations | 225 |
| abstract_inverted_index.neutralized | 141 |
| abstract_inverted_index.processors, | 186 |
| abstract_inverted_index.proprietary | 236 |
| abstract_inverted_index.protections | 60 |
| abstract_inverted_index.ASLR(KASLR). | 34 |
| abstract_inverted_index.applications | 44 |
| abstract_inverted_index.information. | 17 |
| abstract_inverted_index.instructions | 127 |
| abstract_inverted_index.side-channel | 100 |
| abstract_inverted_index.successfully | 147 |
| abstract_inverted_index.super-secure | 228 |
| abstract_inverted_index.Randomization | 30 |
| abstract_inverted_index.Transactional | 96 |
| abstract_inverted_index.combinationof | 203 |
| abstract_inverted_index.consequently, | 140 |
| abstract_inverted_index.Virtualization | 237 |
| abstract_inverted_index.applicationsto | 12 |
| abstract_inverted_index.implementation | 160 |
| abstract_inverted_index.software-based | 23, 245 |
| abstract_inverted_index.Synchronization | 97 |
| abstract_inverted_index.implementation. | 198 |
| abstract_inverted_index.Hypervisor-based | 137 |
| abstract_inverted_index.considered.Armed | 49 |
| abstract_inverted_index.regularlycarried | 20 |
| abstract_inverted_index.modernprocessors) | 211 |
| abstract_inverted_index.InstructionPrevention | 133 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile |