{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:04:44Z","timestamp":1765357484587,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323687","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T13:58:45Z","timestamp":1701352725000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?"],"prefix":"10.1109","author":[{"given":"Andrija","family":"Ne\u0161kovi\u0107","sequence":"first","affiliation":[{"name":"Institute of Computer Engineering"}]},{"given":"Saleh","family":"Mulhem","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering"}]},{"given":"Alexander","family":"Treff","sequence":"additional","affiliation":[{"name":"Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany"}]},{"given":"Rainer","family":"Buchty","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering"}]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany"}]},{"given":"Mladen","family":"Berekovic","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","first-page":"515","article-title":"CSI NN: Reverse Engineering of Neural Network Architectures through Electromagnetic Side Channel","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium","author":"Batina","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12026"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/3474376.3487284","article-title":"WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator","volume-title":"Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security","author":"Won","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2020CIP0024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2026356"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2013.6653605"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203805"},{"issue":"1","key":"ref9","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1515\/itit-2018-0027","article-title":"Security validation of vp-based socs using dynamic information flow tracking","volume":"61","author":"Goli","year":"2019","journal-title":"it - Information Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.59"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3187810"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129426"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/b105236"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FDL.2016.7880368"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/2852339.2852345","article-title":"Black box power estimation for digital signal processors using virtual platforms","volume-title":"Proceedings of the 2016 Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools","author":"Onnebrink","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70234"},{"volume-title":"Embedded System Synthesis and Optimization","year":"2000","author":"Teich","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176558"},{"key":"ref19","first-page":"197","article-title":"MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection","volume-title":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","author":"Dubey"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_29"},{"volume-title":"Digital design and computer architecture","year":"2010","author":"Harris","key":"ref21"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1016\/B978-012379751-3.50031-X","article-title":"Chapter 29 - power and leakage","volume-title":"Memory Systems","author":"Jacob","year":"2008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.29292\/jics.v16i2.501"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2014.6951886"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1982.1653825"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.3012005"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-642-55220-5_26","article-title":"How to certify the leakage of a chip?","volume-title":"Advances in Cryptology - EUROCRYPT 2014 \u2013 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques","volume":"8441","author":"Durvaux","year":"2014"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/978-3-030-26948-7_25","article-title":"Leakage certification revisited: Bounding model errors in side-channel security evaluations","volume-title":"Advances in Cryptology - CRYPTO 2019 \u2013 39th Annual International Cryptology Conference","volume":"11692","author":"Bronchain","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_26"},{"volume-title":"Synopsys PrimePower","year":"2023","key":"ref33"},{"volume-title":"Synopsys DesignCompiler","year":"2023","key":"ref34"},{"volume-title":"Synopsys VCS","year":"2023","key":"ref35"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","start":{"date-parts":[[2023,10,28]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323687.pdf?arnumber=10323687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:14:59Z","timestamp":1710375299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323687","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}