skip to main content
research-article

Leveraging Side-Channel Information for Disassembly and Security

Published: 18 December 2019 Publication History

Abstract

With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical devices, smart home appliances, as well as traditional computing platforms such as personal computers and servers have been increasingly targeted with a variety of cyber attacks. Due to limited hardware resources for embedded devices and difficulty in wide-coverage and on-time software updates, software-only cyber defense techniques, such as traditional anti-virus and malware detectors, do not offer a silver-bullet solution. Hardware-based security monitoring and protection techniques, therefore, have gained significant attention. Monitoring devices using side-channel leakage information, e.g., power supply variation and electromagnetic (EM) radiation, is a promising avenue that promotes multiple directions in security and trust applications. In this article, we provide a taxonomy of hardware-based monitoring techniques against different cyber and hardware attacks, highlight the potentials and unique challenges, and display how power-based side-channel instruction-level monitoring can offer suitable solutions to prevailing embedded device security issues. Further, we delineate approaches for future research directions.

References

[1]
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. 2005. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS’05). ACM, New York, NY, 340--353.
[2]
Martín Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. 2005. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM, 340--353.
[3]
Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, and Sourangshu Bhattacharya. 2017. Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks. Cryptology ePrint Archive, Report 2017/564. https://eprint.iacr.org/2017/564.
[4]
Waqas Amir. 2016. Hackers are Increasingly Targeting IoT Devices with Mirai DDoS Malware. Retrieved on 1 March, 2018 from https://www.hackread.com/iot-devices-with-mirai-ddos-malware/.
[5]
Nate Anderson. 2012. Confirmed: US and Israel Created Stuxnet, Lost Control of It. Retrieved from https://arstechnica.com/tech-policy/2012/06/confirmed-us-israel-created-stuxnet-lost-control-of-it/.
[6]
Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede. 2011. An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs. In Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’011). 105--114.
[7]
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. 2011. Duplexing the sponge: Single-pass authenticated encryption and other applications. Cryptology ePrint Archive, Report 2011/499. https://eprint.iacr.org/2011/499.
[8]
Tyler Bletsch. 2011. Code-Reuse Attacks: New Frontiers and Defenses. Ph.D. dissertation. AAI3463747.
[9]
Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. Springer, Berlin, 16--29.
[10]
Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. 2017. Control-flow integrity: Precision, security, and performance. ACM Computing Surveys 50, 1 (April 2017), Article 16, 33 pages.
[11]
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2003. Template Attacks. Springer, Berlin, 13--28.
[12]
Omar Choudary and Markus G. Kuhn. 2014. Template Attacks on Different Devices. Springer International Publishing, Cham, 179--198.
[13]
Nick Christoulakis, George Christou, Elias Athanasopoulos, and Sotiris Ioannidis. 2016. HCFI: Hardware-enforced control-flow integrity. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY’16). ACM, New York, NY, 38--49.
[14]
Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In Proceedings of the 2013 USENIX Workshop on Health Information Technologies. USENIX, Washington, D.C. https://www.usenix.org/conference/healthtech13/workshop-program/presentation/Clark.
[15]
Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the 3rd ACM Conference on Wireless Network Security. ACM, 89--98.
[16]
DARPA. 2015. Leveraging the Analog Domain for Security (LADS). Retrieved from http://www.darpa.mil/program/leveraging-the-analog-domain-for-security.
[17]
Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi. 2014. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In Proceedings of the 51st Annual Design Automation Conference (DAC’14). ACM, New York, NY, Article 133, 6 pages.
[18]
Ruan de Clercq and Ingrid Verbauwhede. 2017. A survey of hardware-based control flow integrity (CFI). CoRR abs/1706.07257 (2017). arxiv:1706.07257, http://arxiv.org/abs/1706.07257.
[19]
Thomas Eisenbarth, Christof Paar, and Björn Weghenkel. 2010. Building a side channel based disassembler. In Transactions on Computational Science X, Marina L. Gavrilova, C. J. Kenneth Tan, and Edward David Moreno (Eds.). Lecture Notes in Computer Science, Vol. 6340. Springer, Berlin, 78--99.
[20]
The Nexus 5001 Forum. 2003. Standard for a global embedded processor debug interface version 2.0. IEEE-Industry Standards and Technology Organization (IEEE-ISTO).
[21]
Aurélien Francillon and Claude Castelluccia. 2008. Code injection attacks on harvard-architecture devices. In Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM, 15--26.
[22]
Jake Longo Galea, Elke De Mulder, Daniel Page, and Michael Tunstall. 2015. SoC it to EM: Electromagnetic side-channel attacks on a complex system-on-chip. IACR Cryptology ePrint Archive (2015), 561.
[23]
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. 2008. Mutual Information Analysis. Springer, Berlin, 426--442.
[24]
Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. A testing methodology for side-channel resistance validation. In NIST Non-Invasive Attack Testing Workshop. 158--172.
[25]
Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, and Stefan Mangard. 2017. KASLR is Dead: Long Live KASLR. Springer International Publishing, Cham, 161--176.
[26]
Ujjwal Guin, Swarup Bhunia, Domenic Forte, and Mark M. Tehranipoor. 2017. SMA: A system-level mutual authentication for protecting electronic hardware and firmware. IEEE Transactions on Dependable and Secure Computing 14, 3 (2017), 265--278.
[27]
Z. Guo, R. Bhakta, and I. G. Harris. 2014. Control-flow checking for intrusion detection via a real-time debug interface. In Proceedings of the 2014 International Conference on Smart Computing Workshops. 87--92.
[28]
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown. 2001. MiBench: A free, commercially representative embedded benchmark suite. In Proceedings of the 2001 IEEE International Workshop on Workload Characterization (WWC’01). IEEE Computer Society, Washington, DC, 3--14.
[29]
Michael Henson and Stephen Taylor. 2014. Memory encryption: A survey of existing techniques. ACM Computing Surveys 46, 4 (March 2014), Article 53, 26 pages.
[30]
H. Holm. 2014. Signature based intrusion detection for zero-day attacks: (Not) a closed chapter? In Proceedings of the 2014 47th Hawaii International Conference on System Sciences. 4895--4904.
[31]
Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, and Joos Vandewalle. 2011. Machine learning in side-channel analysis: A first study. Journal of Cryptographic Engineering 1, 4 (Oct. 2011), 293.
[32]
Michael Hutter and Jörn-Marc Schmidt. 2013. The temperature side channel and heating fault attacks. In CARDIS, Lecture Notes in Computer Science, Vol. 8419. Springer, 219--235.
[33]
Michael Hutter and Jörn-Marc Schmidt. 2014. The temperature side channel and heating fault attacks. IACR Cryptology ePrint Archive 2014, 190. http://eprint.iacr.org/2014/190.
[34]
Robert Hyatt. 1999. Crafty (186) SPEC CPU2000 Benchmark. Retrieved December 14, 2017 from https://www.spec.org/cpu2000/CINT2000/186.crafty/docs/186.crafty.html.
[35]
Atmel Inc. 2016. AVR Instruction Set Manual. Retrieved from http://www.atmel.com/images/Atmel-0856-AVR-Instruction-Set-Manual.pdf.
[36]
National Instruments. 2018. PXI Platform. Retrieved March 3, 2018 from http://www.ni.com/pxi/.
[37]
Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In ACM SIGARCH Computer Architecture News, Vol. 42. IEEE Press, 361--372.
[38]
Vladimir Kiriansky, Derek Bruening, and Saman P. Amarasinghe. 2002. Secure execution via program shepherding. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, 191--206. http://dl.acm.org/citation.cfm?id=647253.720293.
[39]
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. ArXiv e-prints (Jan. 2018). arxiv:1801.01203
[40]
Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. Springer-Verlag, 388--397.
[41]
E. Kofidis. 2016. Blind source separation: Fundamentals and recent advances (a tutorial overview presented at SBrT-2001). ArXiv e-prints (March 2016). arxiv:stat.ML/1603.03089
[42]
Charalambos Konstantinou and Michail Maniatakos. 2015. Impact of firmware modification attacks on power systems field devices. In Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm’15). IEEE, 283--288.
[43]
Selena Larson. 2018. Major chip flaws affect billions of devices. Retrieved from http://money.cnn.com/2018/01/03/technology/computer-chip-flaw-security/index.html?iid=hp-toplead-dom.
[44]
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. ArXiv e-prints (Jan. 2018). arxiv:1801.01207
[45]
Y. Liu, Y. Jin, and Y. Makris. 2013. Hardware Trojans in wireless cryptographic ICs: Silicon demonstration detection method evaluation. In Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’13). 399--404.
[46]
Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, and Qiang Xu. 2016. On code execution tracking via power side-channel. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM, New York, NY, 1019--1031.
[47]
Cédric Marchand, Lilian Bossuet, and Edward Jung. 2014. IP watermark verification based on power consumption analysis. In Proceedings of the 27th IEEE International System-on-Chip Conference (SOCC’14). IEEE, 330--335.
[48]
David McCann, Carolyn Whitnall, and Elisabeth Oswald. 2016. ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. Cryptology ePrint Archive, Report 2016/517. http://eprint.iacr.org/2016/517.
[49]
Peter Middleton, Peter Kjeldsen, and Jim Tully. 2013. Forecast: The internet of things, worldwide, 2013. Gartner Research (2013).
[50]
Mehari Msgna, Konstantinos Markantonakis, and Keith Mayes. 2014. Precise Instruction-Level Side Channel Profiling of Embedded Processors. Lecture Notes in Computer Science, Vol. 8434. Springer, 129--143.
[51]
Alireza Nazari, Nader Sehatbakhsh, Monjur Alam, Alenka Zajic, and Milos Prvulovic. 2017. EDDIE: EM-based detection of deviations in program execution. In Proceedings of the 44th Annual International Symposium on Computer Architecture (ISCA’17). ACM, New York, NY, 333--346.
[52]
Fabian Oboril and Mehdi Baradaran Tahoori. 2012. ExtraTime: Modeling and analysis of wearout due to transistor aging at microarchitecture-level. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’12). 1--12.
[53]
Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: The case of AES. In Proceedings of the 2006 The Cryptographers’ Track at the RSA Conference on Topics in Cryptology (CT-RSA’06). Springer-Verlag, Berlin, 1--20.
[54]
Jungmin Park, Xiaolin Xu, Yier Jin, Domenic Forte, and Mark Tehranipoor. 2018. Power-based side-channel instruction-level disassembler. In Proceedings of the 55th Annual Design Automation Conference (DAC’18). ACM, New York, NY.
[55]
Siman Parker. 2017. Understanding the Physical Damage of Cyber Attacks. Retrieved from https://www.infosecurity-magazine.com/opinions/physical-damage-cyber-attacks/.
[56]
Nisarg Patel, Avesta Sasan, and Houman Homayoun. 2017. Analyzing hardware based malware detectors. In Proceedings of the 54th Annual Design Automation Conference 2017. ACM, 25.
[57]
S. Picek, A. Heuser, A. Jovic, S. A. Ludwig, S. Guilley, D. Jakobovic, and N. Mentens. 2017. Side-channel analysis and machine learning: A practical perspective. In Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN’17). 4095--4102.
[58]
Santos Merino Del Pozo and François-Xavier Standaert. 2016. Blind Source Separation from Single Measurements using Singular Spectrum Analysis. Cryptology ePrint Archive, Report 2016/314. https://eprint.iacr.org/2016/314.
[59]
Emmanuel Prouff and Matthieu Rivain. 2007. A Generic Method for Secure SBox Implementation. Springer, Berlin, 227--244.
[60]
Tobias Schneider and Amir Moradi. 2015. Leakage Assessment Methodology. Springer, Berlin, 495--513.
[61]
N. Sehatbakhsh, A. Nazari, A. Zajic, and M. Prvulovic. 2016. Spectral profiling: Observer-effect-free profiling by monitoring EM emanations. In Proceedings of the 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO’16). 1--11.
[62]
Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, and Stefan Mangard. 2016. SoK: Systematic classification of side-channel attacks on mobile devices. CoRR abs/1611.03748 (2016).
[63]
Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg, and Christof Paar. 2015. Scandalee: A side-channel-based disassembler using local electromagnetic emanations. In Proceedings of the 2015 Design, Automation and Test in Europe Conference and Exhibition (DATE’15). 139--144. http://dl.acm.org/citation.cfm?id=2755784.
[64]
Masashi Sugiyama and Motoaki Kawanabe. 2012. Machine Learning in Non-Stationary Environments: Introduction to Covariate Shift Adaptation. The MIT Press.
[65]
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th Annual International Conference on Supercomputing (ICS’03). ACM, New York, NY, 160--171.
[66]
Adrian Tang, Simha Sethumadhavan, and Salvatore J. Stolfo. 2014. Unsupervised Anomaly-Based Malware Detection Using Hardware Features. Springer International Publishing, Cham, 109--129.
[67]
Adrian Tang, Simha Sethumadhavan, and Salvatore J. Stolfo. 2017. CLKSCREW: Exposing the perils of security-oblivious energy management. In USENIX Security Symposium.
[68]
Dennis Vermoen, Marc Witteman, and Georgi N. Gaydadjiev. 2007. Reverse engineering Java card applets using power analysis. In Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 International Conference on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems (WISTP’07). Springer-Verlag, Berlin, 138--149. http://dl.acm.org/citation.cfm?id=1763190.1763207.
[69]
W. Wang, V. Reddy, Bo Yang, V. Balakrishnan, S. Krishnan, and Yu Cao. 2008. Statistical prediction of circuit aging under process variations. In Proceedings of the 2008 IEEE Custom Integrated Circuits Conference. 13--16.
[70]
X. Wang, C. Konstantinou, M. Maniatakos, R. Karri, S. Lee, P. Robison, P. Stergiou, and S. Kim. 2016. Malicious firmware detection with hardware performance counters. IEEE Transactions on Multi-Scale Computing Systems 2, 3 (July 2016), 160--173.
[71]
Mario Werner, Thomas Unterluggauer, David Schaffenrath, and Stefan Mangard. 2018. Sponge-based control-flow protection for IoT devices. CoRR abs/1802.06691 (2018). arxiv:1802.06691, http://arxiv.org/abs/1802.06691.
[72]
Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor. 2016. Introduction to cyber-physical system security: A cross-layer perspective. IEEE Transactions on Multi-Scale Computing Systems 3, 3 (2016), 215--227.
[73]
Zhixing Xu, Sayak Ray, Pramod Subramanyan, and Sharad Malik. 2017. Malware detection using machine learning based analysis of virtual memory access patterns. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE’17). European Design and Automation Association, Belgium, 169--174. http://dl.acm.org/citation.cfm?id=3130379.3130417.
[74]
Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC’14). USENIX Association, Berkeley, CA, 719--732. http://dl.acm.org/citation.cfm?id=2671225.2671271.
[75]
Man-Ki Yoon, Sibin Mohan, Jaesik Choi, and Lui Sha. 2015. Memory heat map: Anomaly detection in real-time embedded systems using memory behavior. In Proceedings of the 52nd Annual Design Automation Conference (DAC’15). ACM, New York, NY, Article 35, 6 pages.
[76]
Lu Zhang, Luis Vega Gutierrez, and Michael Bedford Taylor. 2016. Power side channels in security ICs: Hardware countermeasures. CoRR abs/1605.00681 (2016). arxiv:1605.00681, http://arxiv.org/abs/1605.00681.
[77]
YongBin Zhou and DengGuo Feng. 2005. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. Retrieved October 27, 2005 from http://eprint.iacr.org/2005/[email protected] 13083.

Cited By

View all
  • (2025)Enhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT systemExpert Systems with Applications10.1016/j.eswa.2024.126079266(126079)Online publication date: Mar-2025
  • (2024)Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communication ChannelsProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658742(459-464)Online publication date: 12-Jun-2024
  • (2024)A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot SystemsIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34618085(511-529)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Journal on Emerging Technologies in Computing Systems
ACM Journal on Emerging Technologies in Computing Systems  Volume 16, Issue 1
January 2020
232 pages
ISSN:1550-4832
EISSN:1550-4840
DOI:10.1145/3365593
  • Editor:
  • Ramesh Karri
Issue’s Table of Contents
© 2019 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 18 December 2019
Accepted: 01 August 2019
Revised: 01 July 2019
Received: 01 March 2018
Published in JETC Volume 16, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Side-channel information
  2. hardware based monitor
  3. instruction level disassembly
  4. malware detection

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)103
  • Downloads (Last 6 weeks)5
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Enhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT systemExpert Systems with Applications10.1016/j.eswa.2024.126079266(126079)Online publication date: Mar-2025
  • (2024)Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communication ChannelsProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658742(459-464)Online publication date: 12-Jun-2024
  • (2024)A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot SystemsIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34618085(511-529)Online publication date: 2024
  • (2024)Nowhere to Hide: Monitoring Side Channels for Supply Chain ResiliencyIEEE Reliability Magazine10.1109/MRL.2024.33884081:2(27-34)Online publication date: Jun-2024
  • (2023)MarCNNet: A Markovian Convolutional Neural Network for Malware Detection and Monitoring Multi-Core SystemsIEEE Transactions on Computers10.1109/TC.2022.318452072:4(1122-1135)Online publication date: 1-Apr-2023
  • (2023)Efficient Dissimilarity Detection in Time Series With Application to Side-Channel AnalysisIEEE Access10.1109/ACCESS.2023.330914911(93064-93076)Online publication date: 2023
  • (2023)Container security: Precaution levels, mitigation strategies, and research perspectivesComputers & Security10.1016/j.cose.2023.103490135(103490)Online publication date: Dec-2023
  • (2022)Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous EraACM Computing Surveys10.1145/349833755:3(1-40)Online publication date: 3-Feb-2022
  • (2022)Internet of Things World: A New Security PerspectiveSN Computer Science10.1007/s42979-022-01443-z4:1Online publication date: 1-Nov-2022
  • (2022)A Side-Channel Based Disassembler for the ARM-Cortex M0Applied Cryptography and Network Security Workshops10.1007/978-3-031-16815-4_11(183-199)Online publication date: 24-Sep-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media