{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:06:03Z","timestamp":1775073963649,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["GRF-14205018"],"award-info":[{"award-number":["GRF-14205018"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61432017"],"award-info":[{"award-number":["61432017"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274696","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"393-406","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":163,"title":["I Know What You See"],"prefix":"10.1145","author":[{"given":"Lingxiao","family":"Wei","sequence":"first","affiliation":[{"name":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[{"name":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Yannan","family":"Liu","sequence":"additional","affiliation":[{"name":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong and Sangfor Technologies Inc., Shenzhen, China"}]},{"given":"Qiang","family":"Xu","sequence":"additional","affiliation":[{"name":"CUhk REliable Computing Laboratory (CURE), Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/92.784091"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 253--270","author":"Choudary Omar","year":"2013","unstructured":"Omar Choudary and Markus G Kuhn . 2013 . Efficient template attacks . In International Conference on Smart Card Research and Advanced Applications. Springer, 253--270 . Omar Choudary and Markus G Kuhn. 2013. Efficient template attacks. In International Conference on Smart Card Research and Advanced Applications. Springer, 253--270."},{"key":"e_1_3_2_1_5_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Conti Francesco","year":"2015","unstructured":"Francesco Conti and Luca Benini . 2015 . A ultra-low-energy convolution engine for fast brain-inspired vision in multicore clusters. In Design , Automation & Test in Europe Conference & Exhibition (DATE) , 2015. IEEE, 683--688. Francesco Conti and Luca Benini. 2015. A ultra-low-energy convolution engine for fast brain-inspired vision in multicore clusters. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015. IEEE, 683--688."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1985581.1985585"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson , Eric Lantz , Somesh Jha , Simon Lin , David Page , and Thomas Ristenpart . 2014 . Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing . In Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014. 17--32. Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 17--32."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"e_1_3_2_1_10_1","volume-title":"Fourth International Workshop on Digital Mammograph, IWDM 1998","author":"Heath M.","year":"1998","unstructured":"M. Heath , K. Bowyer , Daniel B. Kopans , P. Kegelmeyer Jr ., Richard H. Moore , K. Chang , and S. Munishkumaran . 1998. Current Status of the Digital Database for Screening Mammography. In Digital Mammography , Fourth International Workshop on Digital Mammograph, IWDM 1998 , Nijmegen, The Netherlands , June 1998 . 457--460. M. Heath, K. Bowyer, Daniel B. Kopans, P. Kegelmeyer Jr., Richard H. Moore, K. Chang, and S. Munishkumaran. 1998. Current Status of the Digital Database for Screening Mammography. In Digital Mammography, Fourth International Workshop on Digital Mammograph, IWDM 1998, Nijmegen, The Netherlands, June 1998. 457--460."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196105"},{"key":"e_1_3_2_1_12_1","volume-title":"Binarized Neural Networks. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016","author":"Hubara Itay","year":"2016","unstructured":"Itay Hubara , Matthieu Courbariaux , Daniel Soudry , Ran El-Yaniv , and Yoshua Bengio . 2016 . Binarized Neural Networks. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016 , December 5-10, 2016, Barcelona, Spain. 4107--4115. Itay Hubara, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. 2016. Binarized Neural Networks. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain. 4107--4115."},{"key":"e_1_3_2_1_13_1","unstructured":"BigML Inc. 2017. BigML. https:\/\/www.bigml.com\/  BigML Inc. 2017. BigML. https:\/\/www.bigml.com\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Microsoft Inc. 2017. Microsoft Azure Machine Learning. https:\/\/azure.microsoft.com\/en-us\/services\/machine-learning\/  Microsoft Inc. 2017. Microsoft Azure Machine Learning. https:\/\/azure.microsoft.com\/en-us\/services\/machine-learning\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Xilinx Inc. 2017. Xilinx Spartan-6 FPGA family. https:\/\/www.xilinx.com\/products\/silicon-devices\/fpga\/spartan-6.html  Xilinx Inc. 2017. Xilinx Spartan-6 FPGA family. https:\/\/www.xilinx.com\/products\/silicon-devices\/fpga\/spartan-6.html"},{"key":"e_1_3_2_1_16_1","unstructured":"National Instruments. 2017. NI Multisim. www.ni.com\/multisim\/  National Instruments. 2017. NI Multisim. www.ni.com\/multisim\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_18_1","unstructured":"Satoh Lab.\/UEC. 2017. SAKURA-G. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G.html  Satoh Lab.\/UEC. 2017. SAKURA-G. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G.html"},{"key":"e_1_3_2_1_19_1","volume-title":"SAKURA: Side-channel AttacK User Reference Architecture -- Specification","author":"Lab Satoh","year":"2017","unstructured":"Satoh Lab .\/ UEC. 2017 . SAKURA: Side-channel AttacK User Reference Architecture -- Specification . http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G_Spec_Ver1.0_English.pdf Satoh Lab.\/UEC. 2017. SAKURA: Side-channel AttacK User Reference Architecture -- Specification. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G_Spec_Ver1.0_English.pdf"},{"key":"e_1_3_2_1_20_1","unstructured":"Yann LeCun Yoshua Bengio etal 1995. Convolutional networks for images speech and time series. The handbook of brain theory and neural networks 3361 10 (1995) 1995.   Yann LeCun Yoshua Bengio et al. 1995. Convolutional networks for images speech and time series. The handbook of brain theory and neural networks 3361 10 (1995) 1995."},{"key":"e_1_3_2_1_21_1","unstructured":"Yann LeCun Corinna Cortes and Christopher J.C. Burges. 2001-. THE MNIST DATABASE of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/.  Yann LeCun Corinna Cortes and Christopher J.C. Burges. 2001-. THE MNIST DATABASE of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"e_1_3_2_1_23_1","volume-title":"Second International Workshop","author":"Messerges Thomas S.","year":"2000","unstructured":"Thomas S. Messerges . 2000 . Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000 , Second International Workshop , Worcester, MA, USA , August 17-18, 2000, Proceedings. 238--251. Thomas S. Messerges. 2000. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. 238--251."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_25_1","volume-title":"NSW","author":"Msgna Mehari","year":"2013","unstructured":"Mehari Msgna , Konstantinos Markantonakis , and Keith Mayes . 2013 . The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. In Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney , NSW , Australia, September 25-28, 2013, Revised Selected Papers. 288--304. Mehari Msgna, Konstantinos Markantonakis, and Keith Mayes. 2013. The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. In Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. 288--304."},{"key":"e_1_3_2_1_26_1","unstructured":"Tom O'Haver. 1997. A Pragmatic introduction to signal processing.  Tom O'Haver. 1997. A Pragmatic introduction to signal processing."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"e_1_3_2_1_30_1","unstructured":"Qualcomm. 2017. Artificial intelligence tech in Snapdragon 835. https:\/\/www.qualcomm.com\/snapdragon\/artificial-intelligence  Qualcomm. 2017. Artificial intelligence tech in Snapdragon 835. https:\/\/www.qualcomm.com\/snapdragon\/artificial-intelligence"},{"key":"e_1_3_2_1_31_1","volume-title":"Digital image processing. Pearson Education","author":"Rafael Gonzalez C","year":"2002","unstructured":"C Rafael Gonzalez and Richard Woods . 2002. Digital image processing. Pearson Education ( 2002 ). C Rafael Gonzalez and Richard Woods. 2002. Digital image processing. Pearson Education (2002)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient processing of deep neural networks: A tutorial and survey. arXiv preprint arXiv:1703.09039","author":"Sze Vivienne","year":"2017","unstructured":"Vivienne Sze , Yu-Hsin Chen , Tien-Ju Yang , and Joel Emer . 2017. Efficient processing of deep neural networks: A tutorial and survey. arXiv preprint arXiv:1703.09039 ( 2017 ). Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel Emer. 2017. Efficient processing of deep neural networks: A tutorial and survey. arXiv preprint arXiv:1703.09039 (2017)."},{"key":"e_1_3_2_1_36_1","unstructured":"Tektronics. 2017. MDO3000 Mixed Domain Oscilloscope. http:\/\/www.tek.com\/oscilloscope\/mdo3000-mixed-domain-oscilloscope  Tektronics. 2017. MDO3000 Mixed Domain Oscilloscope. http:\/\/www.tek.com\/oscilloscope\/mdo3000-mixed-domain-oscilloscope"},{"key":"e_1_3_2_1_37_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Tram\u00e8r Florian","year":"2016","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K. Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs . In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016. 601--618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. 601--618."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021727"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021741"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA","acronym":"ACSAC '18","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274696"}},"subtitle":["Power Side-Channel Attack on Convolutional Neural Network Accelerators"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":39,"alternative-id":["10.1145\/3274694.3274696","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274696","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}