{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:17:32Z","timestamp":1767140252456,"version":"build-2238731810"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01092-2","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:10:38Z","timestamp":1752138638000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5552-6825","authenticated-orcid":false,"given":"Jorge","family":"Barredo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7755-2848","authenticated-orcid":false,"given":"Maialen","family":"Eceiza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5555-9712","authenticated-orcid":false,"given":"Jose Luis","family":"Flores","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9641-5646","authenticated-orcid":false,"given":"Mikel","family":"Iturbe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,8]]},"reference":[{"key":"1092_CR1","doi-asserted-by":"publisher","unstructured":"Danladi, M., Baykara, M.: Low Power Wide Area Network Technologies: Open Problems, Challenges, and Potential Applications (2022). https:\/\/doi.org\/10.18280\/rces.090205","DOI":"10.18280\/rces.090205"},{"key":"1092_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189","author":"F Meneghello","year":"2019","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2935189","journal-title":"A Survey of Practical Security Vulnerabilities in Real IoT Devices"},{"key":"1092_CR3","unstructured":"Markets, R.: Global Embedded System Market (2020 to 2025) - Rapid Adoption of Embedded Systems in Smart Homes Presents Lucrative Opportunities. https:\/\/www.globenewswire.com\/news-release\/2020\/03\/26\/2006966\/28124\/en\/Global-Embedded-System-Market-2020-to-2025-Rapid-Adoption-of-Embedded-Systems-in-Smart-Homes-Presents-Lucrative-Opportunities.html (2019)"},{"key":"1092_CR4","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049","author":"S Ravi","year":"2004","unstructured":"Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in Embedded Systems: Design Challenges (2004). https:\/\/doi.org\/10.1145\/1015047.1015049","journal-title":"Security in Embedded Systems: Design Challenges"},{"key":"1092_CR5","unstructured":"ENISA. ENISA Threat Landscape 2022 (2022). https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2022"},{"key":"1092_CR6","unstructured":"Open Web Application Security Project. OWASP Internet of Things (IoT) Top 10 2018. https:\/\/owasp.org\/www-project-internet-of-things\/"},{"key":"1092_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119220","author":"WA Johnson","year":"2021","unstructured":"Johnson, W.A., Ghafoor, S., Prowell, S.: A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3119220","journal-title":"A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems"},{"key":"1092_CR8","doi-asserted-by":"publisher","unstructured":"Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., Markakis, E.K.: A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2962586","DOI":"10.1109\/COMST.2019.2962586"},{"key":"1092_CR9","doi-asserted-by":"publisher","unstructured":"Loi, F., Sivanathan, A., Habibi Gharakheili, H., Radford, A., Sivaraman, V.: Systematically Evaluating Security and Privacy for Consumer IoT Devices (2017). https:\/\/doi.org\/10.1145\/3139937.3139938","DOI":"10.1145\/3139937.3139938"},{"key":"1092_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Shu, L.: The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3078072","journal-title":"The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial"},{"key":"1092_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534479","author":"D Kleidermacher","year":"2008","unstructured":"Kleidermacher, D.: Integrating Static Analysis into a Secure Software Development Process (2008). https:\/\/doi.org\/10.1109\/THS.2008.4534479","journal-title":"Integrating Static Analysis into a Secure Software Development Process"},{"key":"1092_CR12","doi-asserted-by":"publisher","unstructured":"Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems\u2019 Firmwares (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23229","DOI":"10.14722\/ndss.2014.23229"},{"key":"1092_CR13","doi-asserted-by":"publisher","unstructured":"Eisele, M., Maugeri, M., Shriwas, R., Huth, C., Bella, G.: Embedded fuzzing: a review of challenges, tools, and solutions (2022). https:\/\/doi.org\/10.1186\/s42400-022-00123-y","DOI":"10.1186\/s42400-022-00123-y"},{"key":"1092_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966373","author":"S Picek","year":"2017","unstructured":"Picek, S., Heuser, A., Jovic, A., Ludwig, S.A., Guilley, S., Jakobovic, D., Mentens, N.: Side-channel analysis and machine learning: A practical perspective (2017). https:\/\/doi.org\/10.1109\/IJCNN.2017.7966373","journal-title":"Side-channel analysis and machine learning: A practical perspective"},{"key":"1092_CR15","doi-asserted-by":"publisher","DOI":"10.1145\/3446997","author":"U Rioja","year":"2021","unstructured":"Rioja, U., Paguada, S., Batina, L., Armendariz, I.: The Uncertainty of Side-Channel Analysis: A Way to Leverage from Heuristics (2021). https:\/\/doi.org\/10.1145\/3446997","journal-title":"The Uncertainty of Side-Channel Analysis: A Way to Leverage from Heuristics"},{"key":"1092_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: A first study (2011). https:\/\/doi.org\/10.1007\/s13389-011-0023-x","journal-title":"Machine learning in side-channel analysis: A first study"},{"key":"1092_CR17","doi-asserted-by":"publisher","unstructured":"Nappa, A., Papadopoulos, P., Varvello, M., Gomez, D.A., Tapiador, J., Lanzi, A.: PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_5","DOI":"10.1007\/978-3-030-88418-5_5"},{"key":"1092_CR18","unstructured":"Clark, S.S., Ransford, B., Rahmati, A., Guineau, S., Sorber, J., Xu, W., Fu, K.: WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices (2013). https:\/\/www.usenix.org\/conference\/healthtech13\/workshop-program\/presentation\/clark"},{"key":"1092_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27","journal-title":"Mutual Information Analysis"},{"key":"1092_CR20","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh, N., Nazari, A., Alam, M., Werner, F.T., Zhu, Y., Zaji\u0107, A.G., Prvulovi\u0107, M.: REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals (2020). https:\/\/api.semanticscholar.org\/CorpusID:208116287","DOI":"10.1109\/TC.2019.2945767"},{"key":"1092_CR21","doi-asserted-by":"publisher","unstructured":"Lazim\u00a0Qaddoori, S., Ali, Q.I.: An embedded and intelligent anomaly power consumption detection system based on smart metering (2023). https:\/\/doi.org\/10.1049\/wss2.12054","DOI":"10.1049\/wss2.12054"},{"key":"1092_CR22","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507030","author":"G Ara","year":"2022","unstructured":"Ara, G., Cucinotta, T., Mascitti, A.: Simulating execution time and power consumption of real-time tasks on embedded platforms (2022). https:\/\/doi.org\/10.1145\/3477314.3507030","journal-title":"Simulating execution time and power consumption of real-time tasks on embedded platforms"},{"key":"1092_CR23","doi-asserted-by":"publisher","unstructured":"Krosman, K., Sosnowski, J., Gawkowski, P.: Object oriented time series exploration: Applied to power consumption analysis of embedded systems (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.115531https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417421009398","DOI":"10.1016\/j.eswa.2021.115531"},{"key":"1092_CR24","doi-asserted-by":"publisher","unstructured":"Camposano, R., Wilberg, J.: Embedded system design (1996). https:\/\/doi.org\/10.1007\/BF00134682.https:\/\/publica.fraunhofer.de\/handle\/publica\/189659","DOI":"10.1007\/BF00134682."},{"key":"1092_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-85617-751-1.00001-X","author":"W Bolton","year":"2009","unstructured":"Bolton, W.: Programmable Logic Controllers (2009). https:\/\/doi.org\/10.1016\/B978-1-85617-751-1.00001-X","journal-title":"Programmable Logic Controllers"},{"key":"1092_CR26","doi-asserted-by":"publisher","unstructured":"Al-Ali, A., Al-Rousan, M.: Java-based home automation system (2004). https:\/\/doi.org\/10.1109\/TCE.2004.1309414","DOI":"10.1109\/TCE.2004.1309414"},{"key":"1092_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056179","author":"M Eceiza","year":"2021","unstructured":"Eceiza, M., Flores, J.L., Iturbe, M.: Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3056179","journal-title":"Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems"},{"key":"1092_CR28","doi-asserted-by":"publisher","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., Balzarotti, D.: What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23166","DOI":"10.14722\/ndss.2018.23166"},{"key":"1092_CR29","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460","author":"J Winter","year":"2008","unstructured":"Winter, J.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms (2008). https:\/\/doi.org\/10.1145\/1456455.1456460","journal-title":"Trusted computing building blocks for embedded linux-based ARM trustzone platforms"},{"key":"1092_CR30","doi-asserted-by":"publisher","unstructured":"Mu\u00f1oz, A., R\u00ed\u00ados, R., Rom\u00e1n, R., L\u00f3pez, J.: A survey on the (in)security of trusted execution environments (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103180. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823000901","DOI":"10.1016\/j.cose.2023.103180"},{"key":"1092_CR31","doi-asserted-by":"publisher","unstructured":"van\u00a0der Veen, V., Dutt-Sharma, N., Cavallaro, L., Bos, H.: Memory Errors: The Past, the Present, and the Future (2012). https:\/\/doi.org\/10.1007\/978-3-642-33338-5_5","DOI":"10.1007\/978-3-642-33338-5_5"},{"key":"1092_CR32","unstructured":"Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/costin"},{"key":"1092_CR33","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323480","author":"L Batina","year":"2019","unstructured":"Batina, L., Jauernig, P., Mentens, N., Sadeghi, A.R., Stapf, E.: In Hardware We Trust: Gains and Pains of Hardware-assisted. Security (2019). https:\/\/doi.org\/10.1145\/3316781.3323480","journal-title":"Security"},{"key":"1092_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052867","author":"VA Thakor","year":"2021","unstructured":"Thakor, V.A., Razzaque, M.A., Khandaker, M.: Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review. Comparison and Research Opportunities (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052867","journal-title":"Comparison and Research Opportunities"},{"key":"1092_CR35","unstructured":"Council of European Union. Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures to ensure a high common level of cybersecurity in the Union and amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972 and repealing the Directive (EU) 2016\/1148 (NIS 2 Directive) (2022). https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj"},{"key":"1092_CR36","unstructured":"European Commission. Proposal for a Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements, amending Regulation (EU) 2019\/1020 and Directive (EU) 2020\/1828 (2022). https:\/\/www.cyberresilienceact.eu\/the-cyber-resilience-act\/"},{"key":"1092_CR37","unstructured":"IEC 62443-4-1:2018 - Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements. Standard, International Electrotechnical Commission (2018). https:\/\/webstore.iec.ch\/en\/publication\/33615"},{"key":"1092_CR38","unstructured":"IEC 62443-4-2:2019 - Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components. Standard, International Electrotechnical Commission (2019). https:\/\/webstore.iec.ch\/publication\/34421"},{"key":"1092_CR39","doi-asserted-by":"publisher","unstructured":"Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: Threats, vulnerabilities, and attack taxonomy (2015). https:\/\/doi.org\/10.1109\/PST.2015.7232966","DOI":"10.1109\/PST.2015.7232966"},{"key":"1092_CR40","doi-asserted-by":"crossref","unstructured":"Das, D., Sen, S.: Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach (2020) https:\/\/www.mdpi.com\/2410-387X\/4\/4\/30","DOI":"10.3390\/cryptography4040030"},{"key":"1092_CR41","doi-asserted-by":"publisher","DOI":"10.1117\/12.2311329","author":"X Wang","year":"2018","unstructured":"Wang, X., Zhou, Q., Harer, J., Brown, G., Qiu, S., Dou, Z., Wang, J., Hinton, A., Gonzalez, C.A., Chin, P.: Deep learning-based classification and anomaly detection of side-channel signals (2018). https:\/\/doi.org\/10.1117\/12.2311329","journal-title":"Deep learning-based classification and anomaly detection of side-channel signals"},{"key":"1092_CR42","doi-asserted-by":"publisher","DOI":"10.1145\/3015135.3015141","author":"S Moore","year":"2016","unstructured":"Moore, S., Yampolskiy, M., Gatlin, J., McDonald, J.T., Andel, T.R.: Buffer overflow attack\u2019s power consumption signatures (2016). https:\/\/doi.org\/10.1145\/3015135.3015141","journal-title":"Buffer overflow attack\u2019s power consumption signatures"},{"key":"1092_CR43","doi-asserted-by":"publisher","unstructured":"Zhang, T., Tehranipoor, M., Farahmandi, F.: TrustGuard: Standalone FPGA-Based Security Monitoring Through Power Side-Channel (2024). https:\/\/doi.org\/10.1109\/TVLSI.2023.3335876","DOI":"10.1109\/TVLSI.2023.3335876"},{"key":"1092_CR44","doi-asserted-by":"publisher","unstructured":"Ding, F., Li, H., Luo, F., Hu, H., Cheng, L., Xiao, H., Ge, R.: DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels (2020). https:\/\/doi.org\/10.1145\/3320269.3384727","DOI":"10.1145\/3320269.3384727"},{"key":"1092_CR45","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485894","author":"DP Pham","year":"2021","unstructured":"Pham, D.P., Marion, D., Mastio, M., Heuser, A.: Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification (2021). https:\/\/doi.org\/10.1145\/3485832.3485894","journal-title":"Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification"},{"key":"1092_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994033","author":"Z Abbasi","year":"2014","unstructured":"Abbasi, Z., Kargahi, M., Mohaqeqi, M.: Anomaly detection in embedded systems using simultaneous power and temperature monitoring (2014). https:\/\/doi.org\/10.1109\/ISCISC.2014.6994033","journal-title":"Anomaly detection in embedded systems using simultaneous power and temperature monitoring"},{"key":"1092_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.152","author":"P Wang","year":"2017","unstructured":"Wang, P., Govindarasu, M., Ashok, A., Sridhar, S., McKinnon, D.: Data-Driven Anomaly Detection for Power System Generation. Control (2017). https:\/\/doi.org\/10.1109\/ICDMW.2017.152","journal-title":"Control"},{"key":"1092_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-022-00021-2","author":"Y Bai","year":"2022","unstructured":"Bai, Y., Park, J., Tehranipoor, M., Forte, D.: Real-time instruction-level verification of remote IoT\/CPS devices via side channels (2022). https:\/\/doi.org\/10.1007\/s43926-022-00021-2","journal-title":"Real-time instruction-level verification of remote IoT\/CPS devices via side channels"},{"key":"1092_CR49","unstructured":"Lindon, J.C., Tranter, G.E., Koppenaal, D.: Encyclopedia of spectroscopy and spectrometry (2016). https:\/\/www.sciencedirect.com\/referencework\/9780128032244\/encyclopedia-of-spectroscopy-and-spectrometry"},{"key":"1092_CR50","doi-asserted-by":"publisher","DOI":"10.1049\/ip-smt:19990001","author":"G Betta","year":"1999","unstructured":"Betta, G., Liguori, C., Pietrosanto, A.: Structured approach to estimate the measurement uncertainty in digital signal elaboration algorithms (1999). https:\/\/doi.org\/10.1049\/ip-smt:19990001","journal-title":"Structured approach to estimate the measurement uncertainty in digital signal elaboration algorithms"},{"key":"1092_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, M., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6","journal-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards"},{"key":"1092_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7563-6_53","author":"HP Vinutha","year":"2018","unstructured":"Vinutha, H.P., Poornima, B., Sagar, B.M.: Detection of Outliers Using Interquartile Range Technique from Intrusion Dataset (2018). https:\/\/doi.org\/10.1007\/978-981-10-7563-6_53","journal-title":"Detection of Outliers Using Interquartile Range Technique from Intrusion Dataset"},{"key":"1092_CR53","doi-asserted-by":"publisher","DOI":"10.1145\/313817.313834","author":"R Hegde","year":"1999","unstructured":"Hegde, R., Shanbhag, N.: Energy-efficient signal processing via algorithmic noise-tolerance (1999). https:\/\/doi.org\/10.1145\/313817.313834","journal-title":"Energy-efficient signal processing via algorithmic noise-tolerance"},{"key":"1092_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9","author":"S Wold","year":"1987","unstructured":"Wold, S., Esbensen, K., Geladi, P.: Principal component analysis (1987). https:\/\/doi.org\/10.1016\/0169-7439(87)80084-9","journal-title":"Principal component analysis"},{"key":"1092_CR55","doi-asserted-by":"publisher","DOI":"10.1177\/0049124104268644","author":"KP Burnham","year":"2004","unstructured":"Burnham, K.P., Anderson, D.R.: Multimodel inference: understanding AIC and BIC in model selection (2004). https:\/\/doi.org\/10.1177\/0049124104268644","journal-title":"Multimodel inference: understanding AIC and BIC in model selection"},{"key":"1092_CR56","doi-asserted-by":"publisher","unstructured":"Rodriguez, M.Z., Comin, C.H., Casanova, D., Bruno, O.M., Amancio, D.R., Costa, L.d.F., Rodrigues, F.A.: Clustering algorithms: A comparative approach (2019). https:\/\/doi.org\/10.1371\/journal.pone.0210236","DOI":"10.1371\/journal.pone.0210236"},{"key":"1092_CR57","doi-asserted-by":"publisher","unstructured":"McInnes, L., Healy, J., Astels, S., et\u00a0al.: hdbscan: Hierarchical density based clustering. (2017). https:\/\/doi.org\/10.21105\/joss.00205","DOI":"10.21105\/joss.00205"},{"key":"1092_CR58","doi-asserted-by":"publisher","DOI":"10.1002\/widm.30","author":"HP Kriegel","year":"2011","unstructured":"Kriegel, H.P., Kr\u00f6ger, P., Sander, J., Zimek, A.: Density-based clustering (2011). https:\/\/doi.org\/10.1002\/widm.30","journal-title":"Density-based clustering"},{"key":"1092_CR59","unstructured":"Flach, P., Kull, M.: Precision-Recall-Gain Curves: PR Analysis Done Right (2015). https:\/\/papers.nips.cc\/paper\/5867-precision-recall-gain-curves-pr-analysis-done-right.pdf"},{"key":"1092_CR60","doi-asserted-by":"publisher","unstructured":"Harbecke, D., Chen, Y., Hennig, L., Alt, C.: Why only Micro-F1? Class Weighting of Measures for Relation Classification (2022). https:\/\/doi.org\/10.18653\/v1\/2022.nlppower-1.4","DOI":"10.18653\/v1\/2022.nlppower-1.4"},{"key":"1092_CR61","doi-asserted-by":"publisher","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation (2020). https:\/\/doi.org\/10.1186\/s12864-019-6413-7","DOI":"10.1186\/s12864-019-6413-7"},{"key":"1092_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMPCHEMENG.2006.09.004","author":"M Tamura","year":"2007","unstructured":"Tamura, M., Tsujita, S.: A study on the number of principal components and sensitivity of fault detection using PCA (2007). https:\/\/doi.org\/10.1016\/J.COMPCHEMENG.2006.09.004","journal-title":"A study on the number of principal components and sensitivity of fault detection using PCA"},{"key":"1092_CR63","unstructured":"MITRE Corporation. Common Weakness Enumeration (CWE) (2025). https:\/\/cwe.mitre.org"},{"key":"1092_CR64","unstructured":"Raje, K.: STM32 Series Single Chip Microcomputer Market Report 2025 (2025). https:\/\/www.cognitivemarketresearch.com\/stm32-series-single-chip-microcomputer-market-report"},{"key":"1092_CR65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45931-8_9","author":"D Courouss\u00e9","year":"2016","unstructured":"Courouss\u00e9, D., Barry, T., Robisson, B., Jaillon, P., Potin, O., Lanet, J.L.: Runtime code polymorphism as a protection against side channel attacks (2016). https:\/\/doi.org\/10.1007\/978-3-319-45931-8_9","journal-title":"Runtime code polymorphism as a protection against side channel attacks"},{"key":"1092_CR66","unstructured":"Han, Y., Chan, M., Aref, Z., Tippenhauer, N.O., Zonouz, S.: Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/han"}],"updated-by":[{"DOI":"10.1007\/s10207-025-01127-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:00:00Z","timestamp":1759449600000}}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01092-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01092-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01092-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:59:05Z","timestamp":1759485545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01092-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1092"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01092-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,8]]},"assertion":[{"value":"23 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2025","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10207-025-01127-8","URL":"https:\/\/doi.org\/10.1007\/s10207-025-01127-8","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable, as this study involves no human participants or animals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"172"}}