CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Article Swipe
Jorge Barredo
,
Maialen Eceiza
,
José Luis Flores
,
Mikel Iturbe
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s10207-025-01092-2
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s10207-025-01092-2
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s10207-025-01092-2
- https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdf
- OA Status
- hybrid
- References
- 53
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412151835
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412151835Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s10207-025-01092-2Digital Object Identifier
- Title
-
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systemsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-07-08Full publication date if available
- Authors
-
Jorge Barredo, Maialen Eceiza, José Luis Flores, Mikel IturbeList of authors in order
- Landing page
-
https://doi.org/10.1007/s10207-025-01092-2Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdfDirect OA link when available
- Concepts
-
Computer science, Power consumption, Vulnerability (computing), Power analysis, Cryptography, Computer security, Vulnerability assessment, Consumption (sociology), Embedded system, Power (physics), Sociology, Medicine, Psychiatry, Psychological intervention, Social science, Physics, Quantum mechanicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
53Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412151835 |
|---|---|
| doi | https://doi.org/10.1007/s10207-025-01092-2 |
| ids.doi | https://doi.org/10.1007/s10207-025-01092-2 |
| ids.openalex | https://openalex.org/W4412151835 |
| fwci | 0.0 |
| type | article |
| title | CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
| biblio.issue | 4 |
| biblio.volume | 24 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T11424 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9980000257492065 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Security and Verification in Computing |
| topics[2].id | https://openalex.org/T10951 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9975000023841858 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptographic Implementations and Security |
| is_xpac | False |
| apc_list.value | 2590 |
| apc_list.currency | EUR |
| apc_list.value_usd | 3190 |
| apc_paid.value | 2590 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 3190 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7421201467514038 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2984118289 |
| concepts[1].level | 3 |
| concepts[1].score | 0.6810572147369385 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q29954 |
| concepts[1].display_name | Power consumption |
| concepts[2].id | https://openalex.org/C95713431 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6664741039276123 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[2].display_name | Vulnerability (computing) |
| concepts[3].id | https://openalex.org/C71743495 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6603345274925232 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2845210 |
| concepts[3].display_name | Power analysis |
| concepts[4].id | https://openalex.org/C178489894 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5415980219841003 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[4].display_name | Cryptography |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.517667829990387 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C167063184 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4849981963634491 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1400839 |
| concepts[6].display_name | Vulnerability assessment |
| concepts[7].id | https://openalex.org/C30772137 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4610869288444519 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q5164762 |
| concepts[7].display_name | Consumption (sociology) |
| concepts[8].id | https://openalex.org/C149635348 |
| concepts[8].level | 1 |
| concepts[8].score | 0.44728559255599976 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[8].display_name | Embedded system |
| concepts[9].id | https://openalex.org/C163258240 |
| concepts[9].level | 2 |
| concepts[9].score | 0.38190144300460815 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q25342 |
| concepts[9].display_name | Power (physics) |
| concepts[10].id | https://openalex.org/C144024400 |
| concepts[10].level | 0 |
| concepts[10].score | 0.07669728994369507 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q21201 |
| concepts[10].display_name | Sociology |
| concepts[11].id | https://openalex.org/C71924100 |
| concepts[11].level | 0 |
| concepts[11].score | 0.06647941470146179 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[11].display_name | Medicine |
| concepts[12].id | https://openalex.org/C118552586 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7867 |
| concepts[12].display_name | Psychiatry |
| concepts[13].id | https://openalex.org/C27415008 |
| concepts[13].level | 2 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7256382 |
| concepts[13].display_name | Psychological intervention |
| concepts[14].id | https://openalex.org/C36289849 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q34749 |
| concepts[14].display_name | Social science |
| concepts[15].id | https://openalex.org/C121332964 |
| concepts[15].level | 0 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[15].display_name | Physics |
| concepts[16].id | https://openalex.org/C62520636 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[16].display_name | Quantum mechanics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7421201467514038 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/power-consumption |
| keywords[1].score | 0.6810572147369385 |
| keywords[1].display_name | Power consumption |
| keywords[2].id | https://openalex.org/keywords/vulnerability |
| keywords[2].score | 0.6664741039276123 |
| keywords[2].display_name | Vulnerability (computing) |
| keywords[3].id | https://openalex.org/keywords/power-analysis |
| keywords[3].score | 0.6603345274925232 |
| keywords[3].display_name | Power analysis |
| keywords[4].id | https://openalex.org/keywords/cryptography |
| keywords[4].score | 0.5415980219841003 |
| keywords[4].display_name | Cryptography |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.517667829990387 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/vulnerability-assessment |
| keywords[6].score | 0.4849981963634491 |
| keywords[6].display_name | Vulnerability assessment |
| keywords[7].id | https://openalex.org/keywords/consumption |
| keywords[7].score | 0.4610869288444519 |
| keywords[7].display_name | Consumption (sociology) |
| keywords[8].id | https://openalex.org/keywords/embedded-system |
| keywords[8].score | 0.44728559255599976 |
| keywords[8].display_name | Embedded system |
| keywords[9].id | https://openalex.org/keywords/power |
| keywords[9].score | 0.38190144300460815 |
| keywords[9].display_name | Power (physics) |
| keywords[10].id | https://openalex.org/keywords/sociology |
| keywords[10].score | 0.07669728994369507 |
| keywords[10].display_name | Sociology |
| keywords[11].id | https://openalex.org/keywords/medicine |
| keywords[11].score | 0.06647941470146179 |
| keywords[11].display_name | Medicine |
| language | en |
| locations[0].id | doi:10.1007/s10207-025-01092-2 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S164062316 |
| locations[0].source.issn | 1615-5262, 1615-5270 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1615-5262 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Information Security |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Information Security |
| locations[0].landing_page_url | https://doi.org/10.1007/s10207-025-01092-2 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5041264455 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5552-6825 |
| authorships[0].author.display_name | Jorge Barredo |
| authorships[0].countries | ES |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I162361429 |
| authorships[0].affiliations[0].raw_affiliation_string | IKERLAN Technology Research Centre, Mondragon Unibertsitatea, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[0].affiliations[1].raw_affiliation_string | IKERLAN Technology Research Centre, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[0].institutions[0].id | https://openalex.org/I162361429 |
| authorships[0].institutions[0].ror | https://ror.org/00wvqgd19 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I162361429, https://openalex.org/I4210092206 |
| authorships[0].institutions[0].country_code | ES |
| authorships[0].institutions[0].display_name | Mondragon Unibertsitatea |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Jorge Barredo |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | IKERLAN Technology Research Centre, Arrasate/Mondragón, Gipuzkoa, Spain, IKERLAN Technology Research Centre, Mondragon Unibertsitatea, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[1].author.id | https://openalex.org/A5076216328 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7755-2848 |
| authorships[1].author.display_name | Maialen Eceiza |
| authorships[1].countries | ES |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I162361429 |
| authorships[1].affiliations[0].raw_affiliation_string | IKERLAN Technology Research Centre, Mondragon Unibertsitatea, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[1].institutions[0].id | https://openalex.org/I162361429 |
| authorships[1].institutions[0].ror | https://ror.org/00wvqgd19 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I162361429, https://openalex.org/I4210092206 |
| authorships[1].institutions[0].country_code | ES |
| authorships[1].institutions[0].display_name | Mondragon Unibertsitatea |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Maialen Eceiza |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | IKERLAN Technology Research Centre, Mondragon Unibertsitatea, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[2].author.id | https://openalex.org/A5035500193 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5555-9712 |
| authorships[2].author.display_name | José Luis Flores |
| authorships[2].countries | ES |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I169108374 |
| authorships[2].affiliations[0].raw_affiliation_string | University of the Basque Country UPV/EHU, Donostia-San Sebastián, Gipuzkoa, Spain |
| authorships[2].institutions[0].id | https://openalex.org/I169108374 |
| authorships[2].institutions[0].ror | https://ror.org/000xsnr85 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I169108374 |
| authorships[2].institutions[0].country_code | ES |
| authorships[2].institutions[0].display_name | University of the Basque Country |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jose Luis Flores |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | University of the Basque Country UPV/EHU, Donostia-San Sebastián, Gipuzkoa, Spain |
| authorships[3].author.id | https://openalex.org/A5050357792 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-9641-5646 |
| authorships[3].author.display_name | Mikel Iturbe |
| authorships[3].affiliations[0].raw_affiliation_string | IKERLAN Technology Research Centre, Arrasate/Mondragón, Gipuzkoa, Spain |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Mikel Iturbe |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | IKERLAN Technology Research Centre, Arrasate/Mondragón, Gipuzkoa, Spain |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W1883246888, https://openalex.org/W2370114625, https://openalex.org/W1756374135, https://openalex.org/W2062873522, https://openalex.org/W2947584067, https://openalex.org/W2280562859, https://openalex.org/W230721595, https://openalex.org/W3157230915, https://openalex.org/W1496728123, https://openalex.org/W2789975780 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/s10207-025-01092-2 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S164062316 |
| best_oa_location.source.issn | 1615-5262, 1615-5270 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1615-5262 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Information Security |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Information Security |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s10207-025-01092-2 |
| primary_location.id | doi:10.1007/s10207-025-01092-2 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S164062316 |
| primary_location.source.issn | 1615-5262, 1615-5270 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1615-5262 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Information Security |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01092-2.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Information Security |
| primary_location.landing_page_url | https://doi.org/10.1007/s10207-025-01092-2 |
| publication_date | 2025-07-08 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4289351980, https://openalex.org/W2968774960, https://openalex.org/W2120562931, https://openalex.org/W1966143594, https://openalex.org/W3206700599, https://openalex.org/W2999472659, https://openalex.org/W2766295581, https://openalex.org/W3157340262, https://openalex.org/W1970246007, https://openalex.org/W2043118292, https://openalex.org/W4294151777, https://openalex.org/W2734509410, https://openalex.org/W3037751757, https://openalex.org/W2008071701, https://openalex.org/W3202843319, https://openalex.org/W1862426464, https://openalex.org/W2979963465, https://openalex.org/W4323842583, https://openalex.org/W4229062618, https://openalex.org/W3179601963, https://openalex.org/W3023274248, https://openalex.org/W2105077410, https://openalex.org/W3128203310, https://openalex.org/W2782780792, https://openalex.org/W2122587458, https://openalex.org/W4324144553, https://openalex.org/W201766245, https://openalex.org/W2946388572, https://openalex.org/W3127883531, https://openalex.org/W1529728259, https://openalex.org/W3097819802, https://openalex.org/W2803720591, https://openalex.org/W2560839994, https://openalex.org/W4389331428, https://openalex.org/W3091876964, https://openalex.org/W4200518437, https://openalex.org/W2045251625, https://openalex.org/W2771563010, https://openalex.org/W4220848189, https://openalex.org/W2099738102, https://openalex.org/W4240560709, https://openalex.org/W2796878504, https://openalex.org/W2010468809, https://openalex.org/W2089468765, https://openalex.org/W2158196600, https://openalex.org/W2963174546, https://openalex.org/W2601243251, https://openalex.org/W1987111416, https://openalex.org/W4285309821, https://openalex.org/W2999309192, https://openalex.org/W2087346698, https://openalex.org/W2519252889, https://openalex.org/W2072757195 |
| referenced_works_count | 53 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/7 |
| sustainable_development_goals[0].score | 0.7400000095367432 |
| sustainable_development_goals[0].display_name | Affordable and clean energy |
| citation_normalized_percentile.value | 0.33446465 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |