{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:31:16Z","timestamp":1761676276994,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029524","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T14:52:27Z","timestamp":1423579947000},"page":"38-41","source":"Crossref","is-referenced-by-count":9,"title":["Overview of machine learning based side-channel analysis methods"],"prefix":"10.1109","author":[{"given":"Dirmanto","family":"Jap","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jakub","family":"Breier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","article-title":"A unified framework for the analysis of side-channel key recovery attacks EUROCRYPT","volume":"5479","author":"standaert","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"35","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-319-04852-9_10","article-title":"The myth of generic DPA..and the magic of learning CT-RSA","volume":"8366","author":"whitnall","year":"2014","journal-title":"Lecture Notes in Computer Science"},{"key":"17","article-title":"Least squares support vector machines for side-channel analysis","author":"hospodar","year":"2011","journal-title":"COSADE"},{"key":"36","first-page":"2349","article-title":"Learning to select features using their properties","volume":"9","author":"krupka","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"18","article-title":"Side channel attack: An approach based on machine learning","author":"lerman","year":"2011","journal-title":"COSADE"},{"key":"33","first-page":"314","article-title":"Improved leakage model based on genetic algorithm","volume":"2014","author":"zhang","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"15","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-642-04138-9_9","article-title":"Differential cluster analysis CHES","volume":"5747","author":"batina","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_11"},{"key":"16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-642-24209-0_27","article-title":"First principal components analysis: A new side channel distinguisher ICISC","volume":"6829","author":"souissi","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-540-45238-6_3","article-title":"Hidden markov model cryptanalysis CHES","volume":"2779","author":"karlof","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-540-74735-2_2","article-title":"Gaussian mixture models for higher-order side channel analysis CHES","volume":"4727","author":"lemke-rust","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"37","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/1471-2105-7-3","article-title":"Gene selection and classification of microarray data using random forest","volume":"7","author":"daz-uriarte","year":"2006","journal-title":"BMC Bioinformatics"},{"key":"11","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","article-title":"Mutual information analysis CHES","volume":"5154","author":"gierlichs","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"38","article-title":"Practical bayesian optimization of machine learning algorithms","author":"snoek","year":"2012","journal-title":"CoRR"},{"journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction 2nd Ed","year":"2009","author":"hastie","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/978-3-642-37288-9_18","article-title":"Efficient template attacks based on probabilistic multi-class support vector machines CARDIS","volume":"7771","author":"bartkewitz","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"20","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-3-642-29912-4_18","article-title":"Intelligent machine homicide-breaking cryptographic devices using support vector machines COSADE","volume":"7275","author":"heuser","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"22","article-title":"Feature selection using support vector machines","author":"brank","year":"2002","journal-title":"Microsoft Research Tech Rep MSR-TR-2002-63"},{"journal-title":"Side Channel Cryptanalysis Using Machine Learning Using An SVM to Recover des Keys from A Smart Card","year":"2012","author":"he","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_12"},{"key":"25","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-41224-0_7","article-title":"A time series approach for profiling attack SPACE","volume":"8204","author":"lerman","year":"2013","journal-title":"Lecture Notes in Computer Science"},{"key":"26","first-page":"586","article-title":"Innovative method of power analysis","volume":"22","author":"martinasek","year":"2013","journal-title":"Radioengineering"},{"key":"27","article-title":"Optimization of power analysis using neural network","author":"martinasek","year":"2013","journal-title":"CARDIS"},{"key":"28","article-title":"A machine learning approach against a masked AES","author":"lerman","year":"2013","journal-title":"CARDIS"},{"journal-title":"DPAContest V4","year":"2013","key":"29"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"10","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","article-title":"Correlation power analysis with a leakage model CHES","volume":"3156","author":"brier","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems CRYPTO","volume":"1109","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"30","article-title":"Clustering algorithms for non-profiled single-execution attacks on exponentiations","author":"heyszl","year":"2013","journal-title":"CARDIS"},{"key":"7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","article-title":"Template attacks CHES","volume":"2523","author":"chari","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"6","first-page":"892","article-title":"Semi-Supervised learning","author":"zhu","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.1632"},{"key":"5","article-title":"Unsupervised learning","author":"dayan","year":"1999","journal-title":"The MIT Encyclopedia of the Cognitive Sciences"},{"key":"31","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-642-37453-1_34","article-title":"An unsupervised learning model to perform side channel attack PAKDD (1)","volume":"7818","author":"chou","year":"2013","journal-title":"Lecture Notes in Computer Science"},{"key":"4","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"kotsiantis","year":"2007","journal-title":"Informatica (Slovenia)"},{"key":"9","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis CRYPTO","volume":"1666","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/11545262_3","article-title":"A stochastic model for differential side channel cryptanalysis CHES","volume":"3659","author":"schindler","year":"2005","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029524.pdf?arnumber=7029524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:16:38Z","timestamp":1498194998000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029524","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}