{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:23Z","timestamp":1740137363314,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3103800","2022YFB3103800"],"award-info":[{"award-number":["2022YFB3103800","2022YFB3103800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00874-4","type":"journal-article","created":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T08:02:24Z","timestamp":1719388944000},"page":"2991-3006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Acnn: arbitrary trace attacks based on leakage area detection"],"prefix":"10.1007","volume":"23","author":[{"given":"Chong","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Ming","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,26]]},"reference":[{"issue":"1","key":"874_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/S13389-011-0006-Y","volume":"1","author":"PC Kocher","year":"2011","unstructured":"Kocher, P.C., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptogr. Eng. 1(1), 5\u201327 (2011). https:\/\/doi.org\/10.1007\/S13389-011-0006-Y","journal-title":"J. Cryptogr. Eng."},{"key":"874_CR2","volume-title":"Power Analysis Attacks - Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Berlin (2007)"},{"key":"874_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-0-387-71829-3_2","volume-title":"Secure Integrated Circuits and Systems, Integrated Circuits and Systems","author":"F Standaert","year":"2010","unstructured":"Standaert, F.: Introduction to side-channel attacks. In: Verbauwhede, I.M.R. (ed.) Secure Integrated Circuits and Systems, Integrated Circuits and Systems, pp. 27\u201342. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-0-387-71829-3_2"},{"key":"874_CR4","doi-asserted-by":"publisher","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V., (eds.) Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Lecture Notes in Computer Science, vol. 10076, pp. 3\u201326. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"874_CR5","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. IACR Cryptol. ePrint Arch. p.\u00a053 (2018). http:\/\/eprint.iacr.org\/2018\/053"},{"issue":"1","key":"874_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13154\/TCHES.V2020.I1.1-36","volume":"2020","author":"G Zaid","year":"2020","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1\u201336 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I1.1-36","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR7","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Y.\u00a0Bengio, Y.\u00a0LeCun (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings (2015). http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"874_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.13154\/TCHES.V2019.I3.148-179","volume":"3","author":"J Kim","year":"2019","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 3, 148\u2013179 (2019). https:\/\/doi.org\/10.13154\/TCHES.V2019.I3.148-179","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"11","key":"874_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3569577","volume":"55","author":"S Picek","year":"2023","unstructured":"Picek, S., Perin, G., Mariot, L., Wu, L., Batina, L.: Sok: deep learning-based physical side-channel analysis. ACM Comput. Surv. 55(11), 1\u201335 (2023). https:\/\/doi.org\/10.1145\/3569577","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"874_CR10","doi-asserted-by":"publisher","first-page":"828","DOI":"10.46586\/TCHES.V2022.I4.828-861","volume":"2022","author":"G Perin","year":"2022","unstructured":"Perin, G., Wu, L., Picek, S.: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828\u2013861 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I4.828-861","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"874_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.46586\/TCHES.V2021.I3.235-274","volume":"2021","author":"X Lu","year":"2021","unstructured":"Lu, X., Zhang, C., Cao, P., Gu, D., Lu, H.: Pay attention to raw traces: A deep learning architecture for end-to-end profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 235\u2013274 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I3.235-274","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR12","doi-asserted-by":"publisher","unstructured":"Redmon, J., Divvala, S.K., Girshick, R.B., Farhadi, A.: You only look once: Unified, real-time object detection. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, pp. 779\u2013788. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.91","DOI":"10.1109\/CVPR.2016.91"},{"issue":"1","key":"874_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13154\/TCHES.V2019.I1.1-24","volume":"2019","author":"P Robyns","year":"2019","unstructured":"Robyns, P., Quax, P., Lamotte, W.: Improving CEMA using correlation optimization. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 1\u201324 (2019). https:\/\/doi.org\/10.13154\/TCHES.V2019.I1.1-24","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR14","unstructured":"ParisTech, T.: Dpa contest v4. https:\/\/www.dpacontest.org\/v4\/42_traces.php (2014)"},{"key":"874_CR15","doi-asserted-by":"publisher","unstructured":"Das, D., Golder, A., Danial, J., Ghosh, S., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack. In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, p. 134. ACM (2019). https:\/\/doi.org\/10.1145\/3316781.3317934","DOI":"10.1145\/3316781.3317934"},{"issue":"2","key":"874_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.13154\/TCHES.V2020.I2.99-127","volume":"2020","author":"L Wouters","year":"2020","unstructured":"Wouters, L., den Herrewegen, J.V., Garcia, F.D., Oswald, D.F., Gierlichs, B., Preneel, B.: Dismantling dst80-based immobiliser systems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 99\u2013127 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I2.99-127","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, F., Shao, B., Xu, G., Yang, B., Yang, Z., Qin, Z., Ren, K.: From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices. In: 57th ACM\/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, July 20-24, 2020, pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/DAC18072.2020.9218693","DOI":"10.1109\/DAC18072.2020.9218693"},{"issue":"12","key":"874_CR18","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1109\/TVLSI.2019.2926324","volume":"27","author":"A Golder","year":"2019","unstructured":"Golder, A., Das, D., Danial, J., Ghosh, S., Sen, S., Raychowdhury, A.: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720\u20132733 (2019). https:\/\/doi.org\/10.1109\/TVLSI.2019.2926324","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"874_CR19","unstructured":"Thapar, D., Alam, M., Mukhopadhyay, D.: Transca: Cross-family profiled side-channel attacks using transfer learning on deep neural networks. IACR Cryptol. ePrint Arch. p. 1258 (2020). https:\/\/eprint.iacr.org\/2020\/1258"},{"key":"874_CR20","doi-asserted-by":"publisher","unstructured":"Cao, P., Zhang, H., Gu, D., Lu, Y., Yuan, Y.: AL-PA: cross-device profiled side-channel attack using adversarial learning. In: R.\u00a0Oshana (ed.) DAC \u201922: 59th ACM\/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022, pp. 691\u2013696. ACM (2022). https:\/\/doi.org\/10.1145\/3489517.3530517","DOI":"10.1145\/3489517.3530517"},{"key":"874_CR21","unstructured":"Botocan, C.: One network to rule them all. an autoencoder approach to encode datasets. IACR Cryptol. ePrint Arch. p. 890 (2022). https:\/\/eprint.iacr.org\/2022\/890"},{"key":"874_CR22","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: B.S.K. Jr., \u00c7.K. Ko\u00e7, C.\u00a0Paar (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2523, pp. 13\u201328. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"874_CR23","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: Good is not good enough - deriving optimal distinguishers from communication theory. In: L.\u00a0Batina, M.\u00a0Robshaw (eds.) Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, Lecture Notes in Computer Science, vol. 8731, pp. 55\u201374. Springer (2014). doi:10.1007\/978-3-662-44709-3_4","DOI":"10.1007\/978-3-662-44709-3_4"},{"issue":"6088","key":"874_CR24","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"key":"874_CR25","doi-asserted-by":"publisher","unstructured":"Martinasek, Z., Hajny, J., Malina, L.: Optimization of power analysis using neural network. In: A.\u00a0Francillon, P.\u00a0Rohatgi (eds.) Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, Lecture Notes in Computer Science, vol. 8419, pp. 94\u2013107. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_7","DOI":"10.1007\/978-3-319-08302-5_7"},{"issue":"3","key":"874_CR26","doi-asserted-by":"publisher","first-page":"147","DOI":"10.13154\/TCHES.V2020.I3.147-168","volume":"2020","author":"L Wouters","year":"2020","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147\u2013168 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I3.147-168","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR27","unstructured":"Luo, W., Li, Y., Urtasun, R., Zemel, R.S.: Understanding the effective receptive field in deep convolutional neural networks. CoRR arXiv:abs\/1701.04128 (2017)"},{"key":"874_CR28","unstructured":"Bhasin, S., Danger, J., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. IACR Cryptol. ePrint Arch. p. 717 (2013). http:\/\/eprint.iacr.org\/2013\/717"},{"key":"874_CR29","doi-asserted-by":"publisher","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. In: I.\u00a0Polian, M.\u00a0St\u00f6ttinger (eds.) Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings, Lecture Notes in Computer Science, vol. 11421, pp. 145\u2013167. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_9","DOI":"10.1007\/978-3-030-16350-1_9"},{"key":"874_CR30","doi-asserted-by":"publisher","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: K.G. Paterson, D.\u00a0Stebila (eds.) Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers, Lecture Notes in Computer Science, vol. 11959, pp. 645\u2013666. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26","DOI":"10.1007\/978-3-030-38471-5_26"},{"issue":"3","key":"874_CR31","doi-asserted-by":"publisher","first-page":"422","DOI":"10.46586\/TCHES.V2023.I3.422-444","volume":"2023","author":"M Staib","year":"2023","unstructured":"Staib, M., Moradi, A.: Deep learning side-channel collision attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3), 422\u2013444 (2023). https:\/\/doi.org\/10.46586\/TCHES.V2023.I3.422-444","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"874_CR32","doi-asserted-by":"publisher","unstructured":"Rezatofighi, H., Tsoi, N., Gwak, J., Sadeghian, A., Reid, I.D., Savarese, S.: Generalized intersection over union: A metric and a loss for bounding box regression. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, June 16-20, 2019, pp. 658\u2013666. Computer Vision Foundation \/ IEEE (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00075.http:\/\/openaccess.thecvf.com\/content_CVPR_2019\/html\/Rezatofighi_Generalized_Intersection_Over_Union_A_Metric_and_a_Loss_for_CVPR_2019_paper.html","DOI":"10.1109\/CVPR.2019.00075."},{"key":"874_CR33","unstructured":"Zhang, R.: Making convolutional networks shift-invariant again. In: K.\u00a0Chaudhuri, R.\u00a0Salakhutdinov (eds.) Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA, Proceedings of Machine Learning Research, vol.\u00a097, pp. 7324\u20137334. PMLR (2019). http:\/\/proceedings.mlr.press\/v97\/zhang19a.html"},{"issue":"6","key":"874_CR34","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"JF Canny","year":"1986","unstructured":"Canny, J.F.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 8(6), 679\u2013698 (1986). https:\/\/doi.org\/10.1109\/TPAMI.1986.4767851","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"874_CR35","doi-asserted-by":"publisher","unstructured":"Nassar, M., Souissi, Y., Guilley, S., Danger, J.: RSM: A small and fast countermeasure for aes, secure against 1st and 2nd-order zero-offset scas. In: W.\u00a0Rosenstiel, L.\u00a0Thiele (eds.) 2012 Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, Dresden, Germany, March 12-16, 2012, pp. 1173\u20131178. IEEE (2012). https:\/\/doi.org\/10.1109\/DATE.2012.6176671","DOI":"10.1109\/DATE.2012.6176671"},{"key":"874_CR36","doi-asserted-by":"publisher","first-page":"3863","DOI":"10.1109\/TIFS.2022.3216959","volume":"17","author":"P Cao","year":"2022","unstructured":"Cao, P., Zhang, C., Lu, X., Gu, D., Xu, S.: Improving deep learning based second-order side-channel analysis with bilinear CNN. IEEE Trans. Inf. Forensics Secur. 17, 3863\u20133876 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3216959","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"874_CR37","doi-asserted-by":"publisher","unstructured":"Egger, M., Schamberger, T., Tebelmann, L., Lippert, F., Sigl, G.: A second look at the ASCAD databases. In: J.\u00a0Balasch, C.\u00a0O\u2019Flynn (eds.) Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings, Lecture Notes in Computer Science, vol. 13211, pp. 75\u201399. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_4","DOI":"10.1007\/978-3-030-99766-3_4"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00874-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00874-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00874-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:19:49Z","timestamp":1721013589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00874-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["874"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00874-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,6,26]]},"assertion":[{"value":"26 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We comply with the ethical standards as defined by Springer, and the results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}