{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:18:25Z","timestamp":1772727505600,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030299583","type":"print"},{"value":"9783030299590","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_13","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"259-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Side-Channel Aware Fuzzing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7901-7168","authenticated-orcid":false,"given":"Philip","family":"Sperl","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-7506","authenticated-orcid":false,"given":"Konstantin","family":"B\u00f6ttinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Alimi, V., Vernois, S., Rosenberger, C.: Analysis of embedded applications by evolutionary fuzzing. In: 2014 International Conference on High Performance Computing Simulation (HPCS), pp. 551\u2013557, July 2014","DOI":"10.1109\/HPCSim.2014.6903734"},{"key":"13_CR2","unstructured":"Arm Holdings: Cortex-M4 Technical Reference Manual. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0439b\/DDI0439B_cortex_m4_r0p0_trm.pdf"},{"key":"13_CR3","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI 2008, pp. 209\u2013224. USENIX Association, Berkeley (2008). http:\/\/dl.acm.org\/citation.cfm?id=1855741.1855756"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Callan, R., Behrang, F., Zajic, A., Prvulovic, M., Orso, A.: Zero-overhead profiling via EM emanations. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, SSTA 2016, pp. 401\u2013412. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2931037.2931065, http:\/\/doi.acm.org\/10.1145\/2931037.2931065","DOI":"10.1145\/2931037.2931065"},{"key":"13_CR5","unstructured":"Corteggiani, N., Camurati, G., Francillon, A.: Inception: system-wide security testing of real-world embedded systems software. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 309\u2013326. USENIX Association, Baltimore (2018). https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/corteggiani"},{"key":"13_CR6","unstructured":"Davidson, D., Moench, B., Ristenpart, T., Jha, S.: FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution. In: Presented as part of the 22nd USENIX Security Symposium (USENIX Security 2013), pp. 463\u2013478. USENIX, Washington, D.C. (2013). https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/paper\/davidson"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt, B., et al.: LAVA: large-scale automated vulnerability addition. In: IEEE Symposium on Security and Privacy, pp. 110\u2013121. IEEE Computer Society (2016)","DOI":"10.1109\/SP.2016.15"},{"key":"13_CR8","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: Automated whitebox fuzz testing. In: Network and Distributed System Security (NDSS) Symposium, NDSS 2008 (2008)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don\u2019t touch me! contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1095\u20131108. ACM (2017)","DOI":"10.1145\/3133956.3134081"},{"key":"13_CR10","volume-title":"Computer Architecture: A Quantitative Approach","author":"JL Hennessy","year":"2011","unstructured":"Hennessy, J.L., Patterson, D.A.: Computer Architecture: A Quantitative Approach, 5th edn. Morgan Kaufmann Publishers Inc., San Francisco (2011)","edition":"5"},{"key":"13_CR11","volume-title":"The Security Development Lifecycle","author":"M Howard","year":"2006","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press, Redmond (2006)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 447\u2013462. IEEE Computer Society, Washington, DC (2010). https:\/\/doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lee, H., Choi, K., Chung, K., Kim, J., Yim, K.: Fuzzing CAN packets into automobiles. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 817\u2013821, March 2015","DOI":"10.1109\/AINA.2015.274"},{"key":"13_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"issue":"2","key":"13_CR16","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"B Matthews","year":"1975","unstructured":"Matthews, B.: Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochim. Biophys. Acta (BBA) Protein Struct. 405(2), 442\u2013451 (1975)","journal-title":"Biochim. Biophys. Acta (BBA) Protein Struct."},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-06320-1_11","volume-title":"Information Security Practice and Experience","author":"M Msgna","year":"2014","unstructured":"Msgna, M., Markantonakis, K., Mayes, K.: Precise instruction-level side channel profiling of embedded processors. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 129\u2013143. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06320-1_11"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., Balzarotti, D.: What you corrupt is not what you crash: challenges in fuzzing embedded devices. In: Network and Distributed System Security (NDSS) Symposium, NDSS 2018, February 2018","DOI":"10.14722\/ndss.2018.23166"},{"key":"13_CR19","unstructured":"National Institute of Standards and Technology: Advanced encryption standard. NIST FIPS PUB 197 (2001)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 145\u2013152, July 2015","DOI":"10.1109\/PST.2015.7232966"},{"key":"13_CR21","unstructured":"Powers, D.: Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation (2011)"},{"issue":"1","key":"13_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JRPROC.1949.232969","volume":"37","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication in the presence of noise. Proc. IRE 37(1), 10\u201321 (1949)","journal-title":"Proc. IRE"},{"key":"13_CR23","unstructured":"STMicroelectronics: STM32F417xx Datasheet. https:\/\/www.st.com\/resource\/en\/datasheet\/dm00035129.pdf"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Strobel, D., Bache, F., Oswald, D., Schellenberg, F., Paar, C.: SCANDALee: a side-ChANnel-based DisAssembLer using local electromagnetic emanations. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 139\u2013144, March 2015","DOI":"10.7873\/DATE.2015.0639"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-319-99843-5_19","volume-title":"Critical Information Infrastructures Security","author":"P Van Aubel","year":"2018","unstructured":"Van Aubel, P., Papagiannopoulos, K., Chmielewski, \u0141., Doerr, C.: Side-channel based intrusion detection for industrial control systems. In: D\u2019Agostino, G., Scala, A. (eds.) Critical Information Infrastructures Security, pp. 207\u2013224. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99843-5_19"},{"key":"13_CR26","doi-asserted-by":"publisher","unstructured":"Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: AVATAR: a framework to support dynamic security analysis of embedded systems\u2019 firmwares. In: Network and Distributed System Security Symposium, San Diego, USA, 23\u201326 February 2014, NDSS 2014, February 2014. https:\/\/doi.org\/10.14722\/ndss.2014.23229, http:\/\/www.eurecom.fr\/publication\/4158","DOI":"10.14722\/ndss.2014.23229"},{"key":"13_CR27","unstructured":"Zalewski, M.: American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:05:04Z","timestamp":1726358704000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}