{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:53:15Z","timestamp":1753887195256,"version":"3.37.3"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"ARC Discovery","award":["DP190103660","DP200103207"],"award-info":[{"award-number":["DP190103660","DP200103207"]}]},{"name":"ARC Linkage","award":["LP180100663"],"award-info":[{"award-number":["LP180100663"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcs.2024.3461808","type":"journal-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T18:15:09Z","timestamp":1726510509000},"page":"511-529","source":"Crossref","is-referenced-by-count":2,"title":["A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3094-0021","authenticated-orcid":false,"given":"Yomna Mokhtar","family":"Ibrahim","sequence":"first","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]},{"given":"Shabnam Kasra","family":"Kermanshahi","sequence":"additional","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]},{"given":"Kathryn","family":"Kasmarik","sequence":"additional","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, ACT, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104525"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2012.6304778"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32552-1_53"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0213-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3072740"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8889122"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.abf1538"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.002"},{"article-title":"Reconstructing robot operations via radio-frequency side-channel","year":"2022","author":"Shah","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2932736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2945767"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00024-0_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"issue":"4","key":"ref19","first-page":"54","article-title":"Side channel attack-survey","volume":"1","author":"Persial","year":"2011","journal-title":"Int. J. Adv. Sci. Res. Rev."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2018EBI0001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072653"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947185"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93524-9_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISICIR.2014.7029524"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3359621"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3135324"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2019.8909185"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3304080.3304084"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530437"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSP55486.2022.00018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.37936\/ecti-cit.2020142.239925"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994789"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42068-0_7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924447"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3020407"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586131"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISI53945.2021.9624778"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25319-5_2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-022-1229-3"},{"key":"ref48","article-title":"Nonce, once: A single-trace em side channel attack on several constant-time elliptic curve implementations in mobile platforms","volume-title":"Proc. IEEE Eur. Symp. Secur. Privacy","author":"Monjur","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.358-401"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9640-4"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.166-191"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/fi16020045"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421214"},{"key":"ref54","first-page":"29","article-title":"Advanced far field em side-channel attack on AES","volume-title":"Proc. 7th ACM Cyber- Phys. Syst. Secur. Workshop","author":"Wang","year":"2021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-024-00347-3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0665-3"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC48616.2019.8986117"},{"key":"ref58","first-page":"1","article-title":"X-DeepSCA: Cross-device deep learning side channel attack","volume-title":"Proc. 56th Annu. Des. Automat. Conf.","author":"Das","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4040030"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"ref61","article-title":"TranSCA: Cross-family profiled side-channel attacks using transfer learning on deep neural networks","author":"Thapar","year":"2020","journal-title":"Cryptol. ePrint Arch."},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88238-9_11"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/app132112025"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13071348"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS49979.2021.9432678"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.23919\/EuCAP48036.2020.9135387"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.3037659"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24552"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/EMCEurope57790.2023.10274170"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484549"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01770-0"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3092209"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399362"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3432291.3432300"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3629167"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833773"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053913"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23021"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2022.3159868"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s23062917"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81645-2_7"},{"key":"ref86","first-page":"515","article-title":"$\\lbrace$CSI $\\rbrace$$\\lbrace$ NN$\\rbrace$: Reverse engineering of neural network architectures through electromagnetic side channel","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur. 19)","author":"Batina","year":"2019"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_11"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/app12094135"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833894"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_6"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"ref93","first-page":"4383","article-title":"Can one hear the shape of a neural network?: Snooping the GPU via magnetic side channel","volume-title":"Proc. USENIX Secur. Symp.","author":"Maia","year":"2022"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CICC51472.2021.9431438"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184657"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240804"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.110-145"},{"key":"ref99","first-page":"193","article-title":"Side-channel attacks","author":"Bhunia","year":"2019","journal-title":"Hardware Secur."},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501747"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.058"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.012"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA48905.2020.9182814"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.300907"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301003"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301308"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051921"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301684"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS60797.2024.10527284"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13081579"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00074-w"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080510"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00060"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3110954"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485894"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3076354"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/s21248288"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/OJCAS.2022.3210163"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/5254.850822"},{"key":"ref120","first-page":"235","article-title":"Towards collaborative robots for infrastructure security applications","volume-title":"Proc. 2004 Int. Symp. Collaborative Technol. Syst.","author":"Guo","year":"2004"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-010-9497-5"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/SSS47320.2020.9174264"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.063"},{"key":"ref124","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur. 15)","author":"Son","year":"2015"},{"key":"ref125","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Eur."},{"key":"ref126","first-page":"859","article-title":"Stealthy tracking of autonomous vehicles with cache side channels","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Luo","year":"2020"},{"article-title":"Fingerprinting robot movements via acoustic side channel","year":"2022","author":"Shah","key":"ref127"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3642974.3652286"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782664\/10375894\/10681247.pdf?arnumber=10681247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T17:54:21Z","timestamp":1728323661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10681247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":128,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2024.3461808","relation":{},"ISSN":["2644-1268"],"issn-type":[{"type":"electronic","value":"2644-1268"}],"subject":[],"published":{"date-parts":[[2024]]}}}