{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T23:15:14Z","timestamp":1776208514566,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031803109","type":"print"},{"value":"9783031803116","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_1","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:30:41Z","timestamp":1733963441000},"page":"3-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["OccPoIs: Points of\u00a0Interest Based on\u00a0Neural Network\u2019s Key Recovery in\u00a0Side-Channel Analysis Through Occlusion"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8651-574X","authenticated-orcid":false,"given":"Trevor","family":"Yap","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-4337","authenticated-orcid":false,"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-5127","authenticated-orcid":false,"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"1_CR1","unstructured":"Alber, M., et al.: iNNvestigate neural networks! J. Mach. Learn. Res. 20(93), 1\u20138 (2019). http:\/\/jmlr.org\/papers\/v20\/18-540.html"},{"key":"1_CR2","unstructured":"Amazon: Model Explainability with AWS Artificial Intelligence and Machine Learning Solutions (2021). https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/model-explainability-aws-ai-ml\/interpretability-versus-explainability.html"},{"key":"1_CR3","unstructured":"Ancona, M., Ceolini, E., \u00d6ztireli, C., Gross, M.: Towards better understanding of gradient-based attribution methods for deep neural networks. arXiv preprint arXiv:1711.06104 (2017)"},{"issue":"7","key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach, S., Binder, A., Montavon, G., Klauschen, F., M\u00fcller, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS ONE 10(7), e0130140 (2015)","journal-title":"PLoS ONE"},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163\u2013188 (2020)","journal-title":"J. Cryptogr. Eng."},{"key":"1_CR6","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: 2014 International Symposium on Electromagnetic Compatibility, Tokyo, pp. 310\u2013313 (2014)"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1613\/jair.1.12228","volume":"70","author":"N Burkart","year":"2021","unstructured":"Burkart, N., Huber, M.F.: A survey on the explainability of supervised machine learning. J. Artif. Intell. Res. 70, 245\u2013317 (2021)","journal-title":"J. Artif. Intell. Res."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_17"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Debande, N., Souissi, Y., Nassar, M., Guilley, S., Le, T.H., Danger, J.L.: \u201cRe-synchronization by moments\u201d: an efficient solution to align Side-Channel traces. In: 2011 IEEE International Workshop on Information Forensics and Security, pp.\u00a01\u20136 (2011)","DOI":"10.1109\/WIFS.2011.6123143"},{"key":"1_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-99766-3_4","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"M Egger","year":"2022","unstructured":"Egger, M., Schamberger, T., Tebelmann, L., Lippert, F., Sigl, G.: A second look at the ASCAD databases. In: Balasch, J., O\u2019Flynn, C. (eds.) COSADE 2022. LNCS, pp. 75\u201399. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_4"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11894063_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"B Gierlichs","year":"2006","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15\u201329. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_2"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Gilpin, L.H., Bau, D., Yuan, B.Z., Bajwa, A., Specter, M., Kagal, L.: Explaining explanations: An overview of interpretability of machine learning. In: 2018 IEEE 5th International Conference on data science and advanced analytics (DSAA), pp. 80\u201389. IEEE (2018)","DOI":"10.1109\/DSAA.2018.00018"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-030-38471-5_26","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"B Hettwer","year":"2020","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 645\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-21476-4_2","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.-X.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 20\u201333. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_2"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-16350-1_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Masure","year":"2019","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 145\u2013167. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_9"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10175-0_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C O\u2019Flynn","year":"2014","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243\u2013260. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-030-89915-8_3","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"G Perin","year":"2021","unstructured":"Perin, G., Buhan, I., Picek, S.: Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis. In: Bhasin, S., De Santis, F. (eds.) COSADE 2021. LNCS, vol. 12910, pp. 53\u201381. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89915-8_3"},{"key":"1_CR19","unstructured":"Perin, G., Wu, L., Picek, S.: I know what your layers did: layer-wise explainability of deep learning side-channel analysis. Cryptology ePrint Archive, Paper 2022\/1087 (2022). https:\/\/eprint.iacr.org\/2022\/1087"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L.: Asystematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27(12), 2802\u20132815 (2019)","DOI":"10.1109\/TVLSI.2019.2937365"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Picek, S., Heuser, A., Jovic, A., Ludwig, S.A., Guilley, S., Jakobovic, D., Mentens, N.: Side-channel analysis and machine learning: a practical perspective. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 4095\u20134102 (2017)","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-33027-8_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"O Reparaz","year":"2012","unstructured":"Reparaz, O., Gierlichs, B., Verbauwhede, I.: Selecting time samples for multivariate DPA attacks. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 155\u2013174. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_10"},{"issue":"3","key":"1_CR23","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"2021","author":"J Rijsdijk","year":"2021","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptographic Hardware Embedded Syst. 2021(3), 677\u2013707 (2021)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Rioja, U., Batina, L., Flores, J.L., Armendariz, I.: Auto-tune POIS: estimation of distribution algorithms for efficient side-channel analysis. Computer Networks 198, 108405 (2021). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128621003789","DOI":"10.1016\/j.comnet.2021.108405"},{"key":"1_CR25","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-031-41181-6_8","volume-title":"Applied Cryptography and Network Security Workshops","author":"T Schamberger","year":"2023","unstructured":"Schamberger, T., Egger, M., Tebelmann, L.: Hide and seek: using occlusion techniques for side-channel leakage attribution in CNNs. In: Zhou, J., et al. (eds.) ACNS 2023. LNCS, vol. 13907, pp. 139\u2013158. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-41181-6_8"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_26"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-68773-1_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"D van der Valk","year":"2021","unstructured":"van der Valk, D., Picek, S., Bhasin, S.: Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis. In: Bertoni, G.M., Regazzoni, F. (eds.) COSADE 2020. LNCS, vol. 12244, pp. 175\u2013199. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68773-1_9"},{"issue":"3","key":"1_CR28","doi-asserted-by":"publisher","first-page":"147","DOI":"10.46586\/tches.v2020.i3.147-168","volume":"2020","author":"L Wouters","year":"2020","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware Embedded Syst. 2020(3), 147\u2013168 (2020)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"1_CR29","first-page":"1293","volume":"2020","author":"L Wu","year":"2020","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch. 2020, 1293 (2020)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Trans. Emerging Topics Comput. 1\u201312 (2022)","DOI":"10.1109\/TETC.2022.3218372"},{"issue":"3","key":"1_CR31","doi-asserted-by":"publisher","first-page":"413","DOI":"10.46586\/tches.v2022.i3.413-437","volume":"2022","author":"L Wu","year":"2022","unstructured":"Wu, L., Perin, G., Picek, S.: The best of two worlds: deep learning-assisted template attack. IACR Trans. Cryptographic Hardware Embedded Syst. 2022(3), 413\u2013437 (2022)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"1_CR32","unstructured":"Wu, L., Won, Y.S., Jap, D., Perin, G., Bhasin, S., Picek, S.: Ablation analysis for multi-device deep learning-based physical side-channel analysis. IEEE Trans. Depend. Secure Comput. 1\u201312 (2023)"},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.46586\/tches.v2023.i2.24-53","volume":"2023","author":"T Yap","year":"2023","unstructured":"Yap, T., Benamira, A., Bhasin, S., Peyrin, T.: Peek into the black-box: interpretable neural network using sat equations in side-channel analysis. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(2), 24\u201353 (2023)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"2","key":"1_CR34","doi-asserted-by":"publisher","first-page":"310","DOI":"10.46586\/tches.v2023.i2.310-357","volume":"2023","author":"G Zaid","year":"2023","unstructured":"Zaid, G., Bossuet, L., Carbone, M., Habrard, A., Venelli, A.: Conditional variational autoencoder based on stochastic attacks. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(2), 310\u2013357 (2023)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"1","key":"1_CR35","first-page":"1","volume":"2020","author":"G Zaid","year":"2019","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware Embedded Syst. 2020(1), 1\u201336 (2019)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and Understanding Convolutional Networks (2013)","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-21966-0_15","volume-title":"Information and Communications Security","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y., Zhou, Y., Yu, Z., Hu, C., Zhang, H.: How to compare selections of points of interest for side-channel distinguishers in practice? In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 200\u2013214. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21966-0_15"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:30Z","timestamp":1733965350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}