{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T15:48:59Z","timestamp":1745077739515,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000183","name":"US Army Research Office","doi-asserted-by":"crossref","award":["W911NF-16-1-0130"],"award-info":[{"award-number":["W911NF-16-1-0130"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s41635-021-00117-1","type":"journal-article","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T09:03:03Z","timestamp":1625216583000},"page":"127-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Methods and Analysis of Automated Trace Alignment Under Power Obfuscation in Side Channel Attacks"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2106-564X","authenticated-orcid":false,"given":"Bozhi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Kemeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Minjun","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Janet M.","family":"Roveda","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Lysecky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,2]]},"reference":[{"key":"117_CR1","doi-asserted-by":"crossref","unstructured":"Lu Y, Boey KH, O'Neill M,\u00a0McCanny JV\u00a0(2009) Practical comparison of differential power analysis techniques on an ASIC implementation of the AES algorithm. ISSC 2009, Dublin, p 1\u20136","DOI":"10.1049\/cp.2009.1734"},{"key":"117_CR2","doi-asserted-by":"crossref","unstructured":"Mayer-Sommer R (2000) Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In: Cryptographic Hardware and Embedded Systems, Springer-Verlag, p 78\u201392","DOI":"10.1007\/3-540-44499-8_6"},{"key":"117_CR3","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B\u00a0(1999) Differential power analysis. In: Advances in cryptology\u2014CRYPTO\u201999, Berlin, Heidelberg, p 789\u2013789","DOI":"10.1007\/3-540-48405-1_25"},{"key":"117_CR4","doi-asserted-by":"crossref","unstructured":"Chari S, Rao JR, Rohatgi P\u00a0(2002) Template attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg, p 13\u201328","DOI":"10.1007\/3-540-36400-5_3"},{"key":"117_CR5","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Olivier\u00a0F (2008) Correlation power analysis with a leakage model. In: International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg, p 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"117_CR6","first-page":"426","volume":"2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs B, Batina L, Tuyls P, Preneel B (2008) Mutual information analysis. CHES 2008:426\u2013442","journal-title":"CHES"},{"key":"117_CR7","doi-asserted-by":"crossref","unstructured":"Herbst C, Oswald E, Mangard S\u00a0(2006) An AES smart card implementation resistant to power analysis attack. In: Annual International Conference on Applied Cryptography and Network Security, p 239\u2013252","DOI":"10.1007\/11767480_16"},{"key":"117_CR8","doi-asserted-by":"crossref","unstructured":"Messerges TS\u00a0(2002) Using Second-order power analysis to attack DPA resistant software. In: International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg, p 238\u2013251","DOI":"10.1007\/3-540-44499-8_19"},{"key":"117_CR9","doi-asserted-by":"crossref","unstructured":"Callan R, Zajic A, Prvulovic M\u00a0(2014) A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events. In:\u00a02014 47th Annual IEEE\/ACM International Symposium on Microarchitecture, Cambridge, p 242\u2013254","DOI":"10.1109\/MICRO.2014.39"},{"key":"117_CR10","doi-asserted-by":"crossref","unstructured":"Demme J, Martin R, Waksman A, Sethumadhavan S\u00a0(2013) A quantitative, experimental approach to measuring processor side-channel security. IEEE Micro 33(3):68\u201377","DOI":"10.1109\/MM.2013.23"},{"issue":"7","key":"117_CR11","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/TVLSI.2006.878344","volume":"14","author":"CH Gebotys","year":"2006","unstructured":"Gebotys CH (2006) A table masking countermeasure for low-energy secure embedded systems. IEEE TVLSI Sys 14(7):740\u2013753","journal-title":"IEEE TVLSI Sys"},{"key":"117_CR12","unstructured":"Fei Y, Ding AA, Lao J, Zhang L. (2014) A statistics-based fundamental model for side-channel attack analysis. IACR Cryptol ePrint Arch"},{"key":"117_CR13","first-page":"109","volume":"6632","author":"M Renauld","year":"2011","unstructured":"Renauld M, Standaert FX, Veyrat-Charvillon N, Kamel D, Flandre D (2011) A formal study of power variability issues and side-channel attacks for nanoscale devices. Eurocrypt 6632:109\u2013128","journal-title":"Eurocrypt"},{"key":"117_CR14","doi-asserted-by":"crossref","unstructured":"Van Woudenberg JG, Witteman MF, Bakker B\u00a0(2011) Improving differential power analysis by elastic alignment. In: Cryptographers\u2019 Track at the RSA Conference, Berlin, Heidelberg, p 104\u2013119","DOI":"10.1007\/978-3-642-19074-2_8"},{"key":"117_CR15","doi-asserted-by":"crossref","unstructured":"Tian Q, Huss SA (2012) On the attack of misaligned traces by power analysis methods. In:\u00a02012 Seventh ICCES, Cairo,\u00a0p 28\u201334","DOI":"10.1109\/ICCES.2012.6408478"},{"key":"117_CR16","doi-asserted-by":"crossref","unstructured":"Tian Q, Huss\u00a0SA (2012) On clock frequency effects in side channel attacks of symmetric block ciphers. In: International Conference NTMS, Istanbul,\u00a0p 1\u20135","DOI":"10.1109\/NTMS.2012.6208680"},{"issue":"2","key":"117_CR17","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina L, Gierlichs B, Prouff E, Rivain M, Standaert FX, Veyrat-Charvillon N (2011) Mutual information analysis: a comprehensive study. J Cryptol 24(2):269\u2013291","journal-title":"J Cryptol"},{"key":"117_CR18","doi-asserted-by":"crossref","unstructured":"Tillich S, Herbst\u00a0C (2008) Attacking state-of-the-art software countermeasures\u2014a case study for AES CHES 2008 Lecture Notes in Computer Science, p 228\u2013243","DOI":"10.1007\/978-3-540-85053-3_15"},{"issue":"10","key":"117_CR19","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.1109\/TCAD.2015.2424951","volume":"34","author":"H Eldib","year":"2015","unstructured":"Eldib H, Wang C, Taha M, Schaumont P (2015) Quantitative masking strength: quantifying the power side-channel resistance of software code. IEEE Trans Comput Aided Des Integr Circuits Syst 34(10):1558\u20131568","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"2","key":"117_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2024716.2024718","volume":"39","author":"N Binkert","year":"2011","unstructured":"Binkert N, Beckmann B, Black G, Reinhardt SK, Saidi A, Basu A, Hestness J, Hower DR, Krishna T, Sardashti S, Sen R (2011) The Gem5 Simulator. ACM SIGARCH Comput Architecture News 39(2):1\u20137","journal-title":"ACM SIGARCH Comput Architecture News"},{"key":"117_CR21","doi-asserted-by":"crossref","unstructured":"Li S, Anh JH, Strong RD, Brockman JB, Tullsen DM, Jouppi\u00a0NP (2009) McPAT: an integrated power, area, and timing modeling framework for multi-core and manycore architectures. In: Proceedings of the 42nd Annual IEEE\/ACM International Symposium on Microarchitecture, p 469\u2013480","DOI":"10.1145\/1669112.1669172"},{"key":"117_CR22","doi-asserted-by":"crossref","unstructured":"Rechberger C, Oswald\u00a0E (2004) Practical template attacks. In: International Workshop on Information Security Applications, Springer, Berlin, Heidelberg, p 440\u2013456","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"117_CR23","doi-asserted-by":"crossref","unstructured":"Standaert FX, Malkin TG, Yung\u00a0M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, p 443\u2013461","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"117_CR24","doi-asserted-by":"crossref","unstructured":"Archambeau C, Peeters E, Standaert FX, Quisquater JJ\u00a0(2006) Template attacks in principal subspaces. In: International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg","DOI":"10.1007\/11894063_1"},{"key":"117_CR25","first-page":"429","volume-title":"Mutual information analysis: how, when and why? CHES 2009","author":"N Veyrat-Charvillon","year":"2009","unstructured":"Veyrat-Charvillon N, Standaert FX (2009) Mutual information analysis: how, when and why? CHES 2009. Springer, Berlin, Heidelberg, pp 429\u2013443"},{"key":"117_CR26","doi-asserted-by":"crossref","unstructured":"Choudary O,\u00a0Kuhn\u00a0MG (2013) Efficient template attacks international conference on smart card research and advanced applications. Springer, Cham, p 253\u2013270","DOI":"10.1007\/978-3-319-14123-7_17"},{"key":"117_CR27","doi-asserted-by":"crossref","unstructured":"Oswald E, Mangard\u00a0S (2007) Template attacks on masking\u2014resistance is futile. In: Cryptographers\u2019 track at the RSA conference, Springer, Berlin, Heidelberg, p 243\u2013256","DOI":"10.1007\/11967668_16"},{"key":"117_CR28","doi-asserted-by":"crossref","unstructured":"Prouff E, Rivain\u00a0M (2013) Masking against side-channel attacks: a formal security proof. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, p 142\u2013159","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"117_CR29","doi-asserted-by":"crossref","unstructured":"Peeters E, Standaert FX, Donckers N, Quisquater\u00a0JJ (2005) Improved higher-order side-channel attacks with FPGA experiments. In: International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, p 309\u2013323","DOI":"10.1007\/11545262_23"},{"key":"117_CR30","doi-asserted-by":"crossref","unstructured":"Rivain M, Prouff E (2017) Provably secure higher-order masking of AES. In: International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, p 413\u2013427","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"117_CR31","unstructured":"ARM MBED AES (2017)\u00a0Accessed:\u00a0https:\/\/tls.mbed.org\/aes-source-code"},{"key":"117_CR32","doi-asserted-by":"crossref","unstructured":"Liu B, Chen K, Seo M, Roveda J, Lysecky\u00a0R (2018) Evaluation of the complexity of automated trace alignment using novel power obfuscation methods. In: ACM Great Lakes Symposium on VLSI (GLSVLSI), Chicago, IL USA","DOI":"10.1145\/3194554.3194640"},{"key":"117_CR33","doi-asserted-by":"crossref","unstructured":"Thiebeauld H, Gagnerot G, Wurcker A, Clavier C (2018) Scatter: a new dimension in side-channel. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, Springer, Cham,\u00a0p 135\u2013152","DOI":"10.1007\/978-3-319-89641-0_8"},{"key":"117_CR34","doi-asserted-by":"crossref","unstructured":"Agosta G, Barenghi A, Pelosi G, Scandale M\u00a0(2015) The MEET approach: securing cryptographic embedded software against side channel attacks. IEEE Trans Comput Aided Des Integr Circuits Syst 34(8):1320\u20131333","DOI":"10.1109\/TCAD.2015.2430320"},{"key":"117_CR35","doi-asserted-by":"publisher","unstructured":"Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems \u2013 CHES 2017. CHES 2017. Lecture Notes in Computer Science. 10529, Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"117_CR36","doi-asserted-by":"crossref","unstructured":"Althoff A, McMahan J, Vega L, Davidson S, Sherwood T, Taylor M, Kastner R (2018) Hiding intermittent information leakage with architectural support for blinking. In:\u00a02018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA), IEEE,\u00a0p 638\u2013649","DOI":"10.1109\/ISCA.2018.00059"},{"key":"117_CR37","doi-asserted-by":"publisher","unstructured":"Golder A, Das D, Danial J, Ghosh S, Sen S, Raychowdhury A (2019)\u00a0Practical approaches toward deep-learning-based cross-device power side-channel attack. In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(2):2720\u20132733.\u00a0https:\/\/doi.org\/10.1109\/TVLSI.2019.2926324","DOI":"10.1109\/TVLSI.2019.2926324"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-021-00117-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-021-00117-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-021-00117-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,10]],"date-time":"2021-07-10T03:40:26Z","timestamp":1625888426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-021-00117-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["117"],"URL":"https:\/\/doi.org\/10.1007\/s41635-021-00117-1","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"20 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}