{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:17Z","timestamp":1761812897603,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032081230"},{"type":"electronic","value":"9783032081247"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_9","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:02Z","timestamp":1761812582000},"page":"175-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulation-Based Software Leakage Evaluation for\u00a0the\u00a0RISC-V Platform"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0151-8165","authenticated-orcid":false,"given":"Nicolai","family":"Schmitt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-1567","authenticated-orcid":false,"given":"Jannik","family":"Zeitschner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0240-399X","authenticated-orcid":false,"given":"Andreas","family":"Heinemann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"9_CR1","unstructured":"lowRISC\/ibex. https:\/\/github.com\/lowRISC\/ibex. Accessed 12 Aug 2025"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Baddam, K., Zwolinski, M.: Evaluation of dynamic voltage and frequency scaling as a differential power analysis countermeasure. In: 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID 2007), pp. 854\u2013862 (2007). https:\/\/doi.org\/10.1109\/VLSID.2007.79. ISSN: 2380-6923","DOI":"10.1109\/VLSID.2007.79"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-29959-0_15","volume-title":"Computer Security \u2013 ESORICS 2019","author":"G Barthe","year":"2019","unstructured":"Barthe, G., Bela\u00efd, S., Cassiers, G., Fouque, P.-A., Gr\u00e9goire, B., Standaert, F.-X.: maskVerif: automated verification of higher-order masking in presence of physical defaults. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 300\u2013318. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_15"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Barthe, G., Gourjon, M., Gr\u00e9goire, B., Orlt, M., Paglialonga, C., Porth, L.: Masking in fine-grained leakage models: construction, implementation and verification. IACR Trans. Cryptogr. Hardw. Embed. Syst. 189\u2013228 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i2.189-228","DOI":"10.46586\/tches.v2021.i2.189-228"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2086696.2086699","volume":"8","author":"AG Bayrak","year":"2012","unstructured":"Bayrak, A.G., Velickovic, N., Ienne, P., Burleson, W.: An architecture-independent instruction shuffler to protect against side-channel attacks. ACM Trans. Archit. Code Optim. 8(4), 1\u201319 (2012). https:\/\/doi.org\/10.1145\/2086696.2086699","journal-title":"ACM Trans. Archit. Code Optim."},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-030-99766-3_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Beckers","year":"2022","unstructured":"Beckers, A., Wouters, L., Gierlichs, B., Preneel, B., Verbauwhede, I.: Provable secure software masking in the real-world. In: Balasch, J., O\u2019Flynn, C. (eds.) COSADE 2022. LNCS, vol. 13211, pp. 215\u2013235. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_10"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Bloem, R., Gigerl, B., Gourjon, M., Hadzic, V., Mangard, S., Primas, R.: Power contracts: provably complete power leakage models for processors. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, pp. 381\u2013395. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3548606.3560600","DOI":"10.1145\/3548606.3560600"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmetic\/boolean masking conversions for fun and profit with application to lattice-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 553\u2013588 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I4.553-588","DOI":"10.46586\/TCHES.V2022.I4.553-588"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s13389-020-00227-6","volume":"11","author":"W Cheng","year":"2020","unstructured":"Cheng, W., Carlet, C., Goli, K., Danger, J.-L., Guilley, S.: Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2), 119\u2013133 (2020). https:\/\/doi.org\/10.1007\/s13389-020-00227-6","journal-title":"J. Cryptogr. Eng."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-55220-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"J-S Coron","year":"2014","unstructured":"Coron, J.-S.: Higher order masking of look-up tables. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 441\u2013458. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_25"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-662-44709-3_11","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"J-S Coron","year":"2014","unstructured":"Coron, J.-S., Gro\u00dfsch\u00e4dl, J., Vadnala, P.K.: Secure conversion between boolean and arithmetic masking of any order. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 188\u2013205. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_11"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-89641-0_5","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Y Le Corre","year":"2018","unstructured":"Le Corre, Y., Gro\u00dfsch\u00e4dl, J., Dinu, D.: Micro-architectural power simulator for leakage assessment of cryptographic software on ARM cortex-M3 processors. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 82\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_5"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Faust, S., Grosso, V., Merino Del\u00a0Pozo, S., Paglialonga, C., Standaert, F.X.: Composable masking schemes in the presence of physical defaults & the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 89\u2013120 (2018). https:\/\/doi.org\/10.46586\/tches.v2018.i3.89-120","DOI":"10.46586\/tches.v2018.i3.89-120"},{"key":"9_CR15","unstructured":"Gigerl, B., Hadzic, V., Primas, R., Mangard, S., Bloem, R.: Coco: co-design and co-verification of masked software implementations on CPUs. In: Bailey, M.D., Greenstadt, R. (eds.) 30th USENIX Security Symposium, USENIX Security 2021, 11\u201313 August 2021, pp. 1469\u20131468. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/gigerl. Accessed 13 Aug 2025"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-92075-3_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"B Gigerl","year":"2021","unstructured":"Gigerl, B., Primas, R., Mangard, S.: Secure and efficient software masking on superscalar pipelined processors. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13091, pp. 3\u201332. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_1"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"de\u00a0Grandmaison, A., Heydemann, K., Meunier, Q.L.: ARMISTICE: microarchitectural leakage modeling for masked software formal verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11), 3733\u20133744 (2022). https:\/\/doi.org\/10.1109\/TCAD.2022.3197507","DOI":"10.1109\/TCAD.2022.3197507"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"He, M., Park, J., Nahiyan, A., Vassilev, A., Jin, Y., Tehranipoor, M.: RTL-PSC: automated power side-channel leakage assessment at register-transfer level. In: 2019 IEEE 37th VLSI Test Symposium (VTS), Monterey, CA, USA, pp.\u00a01\u20136. IEEE (2019). https:\/\/doi.org\/10.1109\/VTS.2019.8758600","DOI":"10.1109\/VTS.2019.8758600"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Marshall, B., Page, D., Webb, J.: MIRACLE: MIcRo-ArChitectural Leakage Evaluation: a study of micro-architectural power leakage across many devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 175\u2013220 (2021). https:\/\/doi.org\/10.46586\/tches.v2022.i1.175-220","DOI":"10.46586\/tches.v2022.i1.175-220"},{"key":"9_CR21","unstructured":"McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: \u2018grey box\u2019 modelling for instruction leakages. In: Kirda, E., Ristenpart, T. (eds.) 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 199\u2013216. USENIX Association (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/mccann"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Meyer, L.D., Reparaz, O., Bilgin, B.: Multiplicative masking for AES in hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 431\u2013468 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I3.431-468","DOI":"10.13154\/TCHES.V2018.I3.431-468"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"M\u00fcller, N., Moradi, A.: PROLEAD: a probing-based hardware leakage detection tool. IACR Trans. Cryptogr. Hardw. Embed. Syst. 311\u2013348 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i4.311-348","DOI":"10.46586\/tches.v2022.i4.311-348"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"The NEORV32 RISC-V Processor (2025). https:\/\/doi.org\/10.5281\/ZENODO.5018888","DOI":"10.5281\/ZENODO.5018888"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-319-64647-3_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"K Papagiannopoulos","year":"2017","unstructured":"Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 282\u2013297. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_17"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"M Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413\u2013427. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_28"},{"key":"9_CR27","doi-asserted-by":"publisher","unstructured":"Sharma, M., Bhatnagar, E., Puri, K., Mitra, A., Agarwal, J.: A Survey of RISC-V CPU for IoT Applications (2022). https:\/\/doi.org\/10.2139\/ssrn.4033491","DOI":"10.2139\/ssrn.4033491"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Shelton, M.A., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, 21\u201325 February 2021. The Internet Society (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/rosita-towards-automatic-elimination-of-power-analysis-leakage-in-ciphers\/. Accessed 13 Aug 2025","DOI":"10.14722\/ndss.2021.23137"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Singh, A., Kar, M., Mathew, S., Rajan, A., De, V., Mukhopadhyay, S.: Exploiting on-chip power management for side-channel security. In: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 401\u2013406 (2018). https:\/\/doi.org\/10.23919\/DATE.2018.8342043. ISSN: 1558-1101","DOI":"10.23919\/DATE.2018.8342043"},{"key":"9_CR30","unstructured":"Sokal, R.R., Rohlf, F.J.: Biometry: the principles and practice of statistics in biological research, 2nd edn. W. H. Freeman, San Francisco (1981)"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Welch, B.L.: The generalization of \u2018student\u2019s\u2019 problem when several different population variances are involved. Biometrika 34(1\/2), 28\u201335 (1947). https:\/\/doi.org\/10.2307\/2332510","DOI":"10.2307\/2332510"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Zafar, Y., Har, D.: A novel countermeasure enhancing side channel immunity in FPGAs. In: 2008 International Conference on Advances in Electronics and Micro-Electronics, Valencia, Spain, pp. 132\u2013137. IEEE (2008). https:\/\/doi.org\/10.1109\/ENICS.2008.11","DOI":"10.1109\/ENICS.2008.11"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Zeitschner, J., M\u00fcller, N., Moradi, A.: PROLEAD_sw - Probing-Based Software Leakage Detection for ARM Binaries (2023). https:\/\/eprint.iacr.org\/2023\/034. Publication info: Published by the IACR in TCHES 2023","DOI":"10.46586\/tches.v2023.i3.391-421"},{"key":"9_CR34","doi-asserted-by":"publisher","unstructured":"Zhou, F., Chen, H., Fan, L.: Prover - toward more efficient formal verification of masking in probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1), 552\u2013585 (2024). https:\/\/doi.org\/10.46586\/tches.v2025.i1.552-585","DOI":"10.46586\/tches.v2025.i1.552-585"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:21Z","timestamp":1761812601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}