{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:03:06Z","timestamp":1767992586290,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031411809","type":"print"},{"value":"9783031411816","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41181-6_8","type":"book-chapter","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T19:02:38Z","timestamp":1696359758000},"page":"139-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hide and\u00a0Seek: Using Occlusion Techniques for\u00a0Side-Channel Leakage Attribution in\u00a0CNNs"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Schamberger","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Egger","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Tebelmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Advanced encryption standard (AES). Technical report (2001). https:\/\/doi.org\/10.6028\/nist.fips.197","DOI":"10.6028\/nist.fips.197"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-28954-6_9","volume-title":"Explainable AI: Interpreting, Explaining and Visualizing Deep Learning","author":"M Ancona","year":"2019","unstructured":"Ancona, M., Ceolini, E., \u00d6ztireli, C., Gross, M.: Gradient-based attribution methods. In: Samek, W., Montavon, G., Vedaldi, A., Hansen, L.K., M\u00fcller, K.-R. (eds.) Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. LNCS (LNAI), vol. 11700, pp. 169\u2013191. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28954-6_9"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"e0130140","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach, S., Binder, A., Montavon, G., Klauschen, F., M\u00fcller, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLOS ONE 10, e0130140 (2015)","journal-title":"PLOS ONE"},{"key":"8_CR4","unstructured":"Benadjila, R., Lomn\u00e9, V., Prouff, E., Roche, T.: Secure aes128 encryption implementation for atmega8515. https:\/\/github.com\/ANSSI-FR\/secAES-ATmega8515"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2019","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptographic Eng. 10, 163\u2013188 (2019)","journal-title":"J. Cryptographic Eng."},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/TIFS.2017.2757440","volume":"13","author":"MO Choudary","year":"2018","unstructured":"Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490\u2013501 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"F Durvaux","year":"2016","unstructured":"Durvaux, F., Standaert, F.-X.: From improved leakage detection to the detection of points of interests in leakage traces. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 240\u2013262. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_10"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-99766-3_4","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"M Egger","year":"2022","unstructured":"Egger, M., Schamberger, T., Tebelmann, L., Lippert, F., Sigl, G.: A second look at\u00a0the\u00a0ASCAD databases. In: Balasch, J., O\u2019Flynn, C. (eds.) COSADE 2022. LNCS, vol. 13211, pp. 75\u201399. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_4"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-030-38471-5_26","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"B Hettwer","year":"2020","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 645\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptographic Hardware Embedded Syst. 2019, 148\u2013179 (2019)","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Luo, Z., Zheng, M., Wang, P., Jin, M., Zhang, J., Hu, H.: Towards strengthening deep learning-based side channel attacks with mixup (2021). https:\/\/ia.cr\/2021\/312","DOI":"10.1109\/TrustCom53373.2021.00114"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-16350-1_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Masure","year":"2019","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 145\u2013167. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_9"},{"key":"8_CR13","unstructured":"Papagiannopoulos, K., Glamocanin, O., Azouaoui, M., Ros, D., Regazzoni, F., Stojilovic, M.: The side-channel metric cheat sheet (2022). https:\/\/ia.cr\/2022\/253"},{"key":"8_CR14","unstructured":"Perin, G., Ege, B., Chmielewski, L.: Neural network model assessment for side-channel analysis (2019). https:\/\/ia.cr\/2019\/722"},{"key":"8_CR15","unstructured":"Perin, G., Wu, L., Picek, S.: I know what your layers did: Layer-wise explainability of deep learning side-channel analysis (2022). https:\/\/ia.cr\/2022\/1087"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3569577","volume":"55","author":"S Picek","year":"2022","unstructured":"Picek, S., Perin, G., Mariot, L., Wu, L., Batina, L.: SoK: deep learning-based physical side-channel analysis. ACM Comput. Surv. 55, 1\u201335 (2022)","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"2021","author":"J Rijsdijk","year":"2021","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptographic Hardware Embed. Syst. 2021(3), 677\u2013707 (2021)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"8_CR19","unstructured":"Shrikumar, A., Greenside, P., Shcherbina, A., Kundaje, A.: Not just a black box: learning important features through propagating activation differences. CoRR (2016)"},{"key":"8_CR20","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. In: ICLR (2014)"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.46586\/tches.v2019.i2.107-131","volume":"2","author":"B Timon","year":"2019","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptographic Hardware Embed. Syst. 2, 107\u2013131 (2019)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.46586\/tches.v2020.i3.147-168","volume":"2020","author":"L Wouters","year":"2020","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware Embed. Syst. 2020(3), 147\u2013168 (2020)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"issue":"4","key":"8_CR23","doi-asserted-by":"publisher","first-page":"389","DOI":"10.46586\/tches.v2020.i4.389-415","volume":"2020","author":"L Wu","year":"2020","unstructured":"Wu, L., Picek, S.: Remove some noise: on pre-processing of side-channel measurements with autoencoders. IACR Trans. Cryptographic Hardware Embed. Syst. 2020(4), 389\u2013415 (2020)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"8_CR24","unstructured":"Wu, L., Won, Y.S., Jap, D., Perin, G., Bhasin, S., Picek, S.: Explain some noise: ablation analysis for deep learning-based physical side-channel analysis. Cryptology ePrint Archive, Report 2021\/717 (2021). https:\/\/ia.cr\/2021\/717"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware Embed. Syst. 1\u201336 (2020)","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13389-019-00209-3","volume":"10","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Standaert, F.X.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptographic Eng. 10, 85\u201395 (2019)","journal-title":"J. Cryptographic Eng."},{"key":"8_CR28","unstructured":"Zintgraf, L.M., Cohen, T.S., Adel, T., Welling, M.: Visualizing deep neural network decisions: prediction difference analysis. In: International Conference on Learning Representations (2017)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41181-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T19:03:45Z","timestamp":1696359825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41181-6_8"}},"subtitle":["An Evaluation of the ASCAD Databases"],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031411809","9783031411816"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41181-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"4 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2023\/committees.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"263","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 34 full papers have been accepted from a total of 73 submissions; 13 poster papers are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}