{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:14Z","timestamp":1750220054215,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fds"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,27]]},"DOI":"10.1145\/3555776.3577688","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:16:29Z","timestamp":1686158189000},"page":"1566-1575","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The EVIL Machine: Encode, Visualize and Interpret the Leakage"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9032-8883","authenticated-orcid":false,"given":"Valence","family":"Cristiani","sequence":"first","affiliation":[{"name":"NinjaLab, Montpellier, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9985-7586","authenticated-orcid":false,"given":"Maxime","family":"Lecomte","sequence":"additional","affiliation":[{"name":"Cea-Leti Univ Grenoble Alpes, Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9706-5710","authenticated-orcid":false,"given":"Philippe","family":"Maurine","sequence":"additional","affiliation":[{"name":"LIRMM, Montpellier, France"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MINE: Mutual Information Neural Estimation. arXiv:cs.LG\/1801.04062","author":"Belghazi Mohamed Ishmael","year":"2018","unstructured":"Mohamed Ishmael Belghazi , Aristide Baratin , Sai Rajeswar , Sherjil Ozair , Yoshua Bengio , Aaron Courville , and R Devon Hjelm . 2018 . MINE: Mutual Information Neural Estimation. arXiv:cs.LG\/1801.04062 Mohamed Ishmael Belghazi, Aristide Baratin, Sai Rajeswar, Sherjil Ozair, Yoshua Bengio, Aaron Courville, and R Devon Hjelm. 2018. MINE: Mutual Information Neural Estimation. arXiv:cs.LG\/1801.04062"},{"key":"e_1_3_2_1_2_1","volume-title":"France & CEA, LETI, MINATEC Campus, France.","author":"Benadjila Ryad","year":"2018","unstructured":"Ryad Benadjila , Emmanuel Prouff , R\u00e9mi Strullu , Eleonora Cagli , and C\u00e9cile Dumas . 2018. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. ANSSI , France & CEA, LETI, MINATEC Campus, France. ( 2018 ). Ryad Benadjila, Emmanuel Prouff, R\u00e9mi Strullu, Eleonora Cagli, and C\u00e9cile Dumas. 2018. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. ANSSI, France & CEA, LETI, MINATEC Campus, France. (2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"volume-title":"Advances in Cryptology --- CRYPTO' 99","author":"Chari Suresh","key":"e_1_3_2_1_4_1","unstructured":"Suresh Chari , Charanjit S. Jutla , Josyula R. Rao , and Pankaj Rohatgi . 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks . In Advances in Cryptology --- CRYPTO' 99 , Michael Wiener (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 398--412. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology --- CRYPTO' 99, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 398--412."},{"key":"e_1_3_2_1_5_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems.","author":"Chari Suresh","year":"2002","unstructured":"Suresh Chari , Josyula R Rao , and Pankaj Rohatgi . 2002 . Template attacks . In International Workshop on Cryptographic Hardware and Embedded Systems. Suresh Chari, Josyula R Rao, and Pankaj Rohatgi. 2002. Template attacks. In International Workshop on Cryptographic Hardware and Embedded Systems."},{"key":"e_1_3_2_1_6_1","volume-title":"CARDIS","author":"Cristiani Valence","year":"2019","unstructured":"Valence Cristiani , Maxime Lecomte , and Thomas Hiscock . 2019 . A Bit-Level Approach to Side Channel Based Disassembling . In CARDIS 2019. Prague, Czech Republic. https:\/\/hal.archives-ouvertes.fr\/hal-02338644 Valence Cristiani, Maxime Lecomte, and Thomas Hiscock. 2019. A Bit-Level Approach to Side Channel Based Disassembling. In CARDIS 2019. Prague, Czech Republic. https:\/\/hal.archives-ouvertes.fr\/hal-02338644"},{"key":"e_1_3_2_1_7_1","unstructured":"Valence Cristiani Maxime Lecomte Thomas Hiscock and Philippe Maurine. 2022. Fit The Joint Moments - How to Attack any Masking Schemes. Cryptology ePrint Archive Paper 2022\/927. https:\/\/eprint.iacr.org\/2022\/927 https:\/\/eprint.iacr.org\/2022\/927.  Valence Cristiani Maxime Lecomte Thomas Hiscock and Philippe Maurine. 2022. Fit The Joint Moments - How to Attack any Masking Schemes. Cryptology ePrint Archive Paper 2022\/927. https:\/\/eprint.iacr.org\/2022\/927 https:\/\/eprint.iacr.org\/2022\/927."},{"key":"e_1_3_2_1_8_1","volume-title":"Leakage Assessment Through Neural Estimation of the Mutual Information. In Applied Cryptography and Network Security Workshops. Springer International Publishing.","author":"Cristiani Valence","year":"2020","unstructured":"Valence Cristiani , Maxime Lecomte , and Philippe Maurine . 2020 . Leakage Assessment Through Neural Estimation of the Mutual Information. In Applied Cryptography and Network Security Workshops. Springer International Publishing. Valence Cristiani, Maxime Lecomte, and Philippe Maurine. 2020. Leakage Assessment Through Neural Estimation of the Mutual Information. In Applied Cryptography and Network Security Workshops. Springer International Publishing."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.112"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0010-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0030-6"},{"key":"e_1_3_2_1_13_1","unstructured":"Mart\u00edn Abadi et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org.  Mart\u00edn Abadi et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_2_1_14_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Gierlichs Benedikt","year":"2008","unstructured":"Benedikt Gierlichs , Lejla Batina , Pim Tuyls , and Bart Preneel . 2008. Mutual Information Analysis . In Cryptographic Hardware and Embedded Systems - CHES 2008 , Elisabeth Oswald and Pankaj Rohatgi (Eds.). Springer Berlin Heidelberg . Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. 2008. Mutual Information Analysis. In Cryptographic Hardware and Embedded Systems - CHES 2008, Elisabeth Oswald and Pankaj Rohatgi (Eds.). Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1406.2661"},{"key":"e_1_3_2_1_16_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization . arXiv:cs.LG\/1412.6980 Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. arXiv:cs.LG\/1412.6980"},{"key":"e_1_3_2_1_17_1","volume-title":"Annual International Cryptology Conference.","author":"Kocher Paul","year":"1999","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999 . Differential power analysis . In Annual International Cryptology Conference. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual International Cryptology Conference."},{"key":"e_1_3_2_1_18_1","volume-title":"A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020","author":"Masure Lo\u00efc","year":"2019","unstructured":"Lo\u00efc Masure , C\u00e9cile Dumas , and Emmanuel Prouff . 2019. A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 ( 2019 ). Lo\u00efc Masure, C\u00e9cile Dumas, and Emmanuel Prouff. 2019. A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic analysis: Measures and counter-measures for smart cards.  Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic analysis: Measures and counter-measures for smart cards.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_21_1","volume-title":"OpenSSL: The Open Source toolkit for SSL\/TLS. (April","author":"Project The","year":"2003","unstructured":"The OpenSSL Project . 2003. OpenSSL: The Open Source toolkit for SSL\/TLS. (April 2003 ). www.openssl.org. The OpenSSL Project. 2003. OpenSSL: The Open Source toolkit for SSL\/TLS. (April 2003). www.openssl.org."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"e_1_3_2_1_23_1","volume-title":"Topics in Cryptology - CT-RSA","author":"Whitnall Carolyn","year":"2014","unstructured":"Carolyn Whitnall , Elisabeth Oswald , and Fran\u00e7ois-Xavier Standaert . 2014. The Myth of Generic DPA... and the Magic of Learning . In Topics in Cryptology - CT-RSA 2014 , Josh Benaloh (Ed.). Springer International Publishing , Cham, 183--205. Carolyn Whitnall, Elisabeth Oswald, and Fran\u00e7ois-Xavier Standaert. 2014. The Myth of Generic DPA... and the Magic of Learning. In Topics in Cryptology - CT-RSA 2014, Josh Benaloh (Ed.). Springer International Publishing, Cham, 183--205."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST53231.2021.9699563"}],"event":{"name":"SAC '23: 38th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Tallinn Estonia","acronym":"SAC '23"},"container-title":["Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577688","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555776.3577688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:24Z","timestamp":1750183704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":23,"alternative-id":["10.1145\/3555776.3577688","10.1145\/3555776"],"URL":"https:\/\/doi.org\/10.1145\/3555776.3577688","relation":{},"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}