{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:18:49Z","timestamp":1730200729419,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7841039","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"3713-3721","source":"Crossref","is-referenced-by-count":5,"title":["Reverse engineering smart card malware using side channel analysis with machine learning techniques"],"prefix":"10.1109","author":[{"given":"Hippolyte Djonon","family":"Tsague","sequence":"first","affiliation":[]},{"given":"Bheki","family":"Twala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_11"},{"key":"ref11","first-page":"411","article-title":"Using subspace-based template attacks to compare and combine power and electromagnetic information leakages","volume":"5154","author":"standaert","year":"2008","journal-title":"LNCS"},{"key":"ref12","article-title":"Pattern recognition and machine learning","volume":"16","author":"bishop","year":"2007","journal-title":"Electronic Imaging"},{"key":"ref13","article-title":"Pattern Recognition and Machine Learning","author":"christopher","year":"2006","journal-title":"Information Science and Statistics"},{"key":"ref14","first-page":"440","article-title":"Practical template attacks","volume":"3325","author":"rechberger","year":"2005","journal-title":"WISA 2005 LNCS"},{"key":"ref15","first-page":"44","article-title":"Evaluation of the RC4 algorithm for data encryption","volume":"3","author":"mousa","year":"2006","journal-title":"IJCSA"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/h0071325"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17499-5_4"},{"article-title":"A Robust Machine learning Approach to Microprocessor Instructions Identification","year":"0","author":"djonon-tsague","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_27"},{"article-title":"Side-channel based reverse engineering for microcontrollers","year":"2008","author":"goldack","key":"ref8"},{"key":"ref7","first-page":"200","article-title":"Electromagnetic analysis (EMA): Measures and countermeasures for smart cards","author":"quisquater","year":"0"},{"key":"ref2","article-title":"Side channel analysis for reverse engineering (SCARE) - an improved attack against a secret A3\/A8 GSM algorithm","volume":"49","author":"clavier","year":"2004","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_24"},{"key":"ref9","first-page":"203","article-title":"On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme","volume":"5157","author":"eisenbarth","year":"2008","journal-title":"Advances in Cryptology - CRYPTO"},{"article-title":"Sykipot variant hijacks DOD and Windows smart cards","year":"0","author":"blasco","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5772\/1850"},{"article-title":"The Sykipot Attacks","year":"0","author":"thakur","key":"ref21"},{"key":"ref24","article-title":"Detailed Analysis of Sykipot (Smart Card Proxy Variant)","author":"wa","year":"2012","journal-title":"Sans Institute Infosec Reading Room"},{"journal-title":"New Sykipot developments","year":"0","author":"blasco","key":"ref23"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07841039.pdf?arnumber=7841039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:35:14Z","timestamp":1506998114000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7841039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7841039","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}