{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:10:39Z","timestamp":1755839439816,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":135,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2117349"],"award-info":[{"award-number":["2117349"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560828.3564010","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T15:38:50Z","timestamp":1667576330000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Hardware Moving Target Defenses against Physical Attacks"],"prefix":"10.1145","author":[{"given":"David S.","family":"Koblah","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Fatemeh","family":"Ganji","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sept.9","author":"Definition Polymorphism","year":"2022","unstructured":"2022. Polymorphism Definition . [Online] https:\/\/www.merriamwebster.com\/dictionary\/polymorphism [Accessed : Sept.9 , 2022 ]. (2022). 2022. Polymorphism Definition. [Online] https:\/\/www.merriamwebster.com\/dictionary\/polymorphism [Accessed: Sept.9, 2022]. (2022)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3031836.3031842"},{"key":"e_1_3_2_1_3_1","volume-title":"International workshop on cryptographic hardware and embedded systems. Springer, 29--45","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal , Bruce Archambeault , Josyula R Rao , and Pankaj Rohatgi . 2002 . The EM side-channel (s) . In International workshop on cryptographic hardware and embedded systems. Springer, 29--45 . Dakshi Agrawal, Bruce Archambeault, Josyula R Rao, and Pankaj Rohatgi. 2002. The EM side-channel (s). In International workshop on cryptographic hardware and embedded systems. Springer, 29--45."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00015"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79025-7_12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_19"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_45"},{"key":"e_1_3_2_1_8_1","volume-title":"Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD database. IACR Cryptol. ePrint Arch","author":"Benadjila Ryad","year":"2018","unstructured":"Ryad Benadjila , Emmanuel Prouff , R\u00e9mi Strullu , Eleonora Cagli , and C\u00e9cile Dumas . 2018. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD database. IACR Cryptol. ePrint Arch ., 2018 \/053 (2018). Ryad Benadjila, Emmanuel Prouff, R\u00e9mi Strullu, Eleonora Cagli, and C\u00e9cile Dumas. 2018. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD database. IACR Cryptol. ePrint Arch., 2018\/053 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873554"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2816818"},{"key":"e_1_3_2_1_12_1","volume-title":"IFIP International Workshop on Information Security Theory and Practice. Springer, 40--56","author":"Bringer Julien","year":"2014","unstructured":"Julien Bringer , Claude Carlet , Herv\u00e9 Chabanne , Sylvain Guilley , and Houssem Maghrebi . 2014 . Orthogonal direct sum masking--A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks . In IFIP International Workshop on Information Security Theory and Practice. Springer, 40--56 . Julien Bringer, Claude Carlet, Herv\u00e9 Chabanne, Sylvain Guilley, and Houssem Maghrebi. 2014. Orthogonal direct sum masking--A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. In IFIP International Workshop on Information Security Theory and Practice. Springer, 40--56."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0194-9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0067-1"},{"volume-title":"Coding Theory and Applications","author":"Carlet Claude","key":"e_1_3_2_1_17_1","unstructured":"Claude Carlet and Sylvain Guilley . 2015. Complementary dual codes for countermeasures to side-channel attacks . In Coding Theory and Applications . Springer , 97--105. Claude Carlet and Sylvain Guilley. 2015. Complementary dual codes for countermeasures to side-channel attacks. In Coding Theory and Applications. Springer, 97--105."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_20"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2009.5412599"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0010-2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_26"},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 193--215","author":"Fledel Dor","year":"2018","unstructured":"Dor Fledel and Avishai Wool . 2018 . Sliding-window correlation attacks against encryption devices with an unstable clock . In International Conference on Selected Areas in Cryptography. Springer, 193--215 . Dor Fledel and Avishai Wool. 2018. Sliding-window correlation attacks against encryption devices with an unstable clock. In International Conference on Selected Areas in Cryptography. Springer, 193--215."},{"key":"e_1_3_2_1_26_1","unstructured":"Austin W Fritzke. 2012. Obfuscating against side-channel power analysis using hiding techniques for aes. (2012).  Austin W Fritzke. 2012. Obfuscating against side-channel power analysis using hiding techniques for aes. (2012)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2926555"},{"volume-title":"Security and Artificial Intelligence","author":"Ganji Fatemeh","key":"e_1_3_2_1_28_1","unstructured":"Fatemeh Ganji and Shahin Tajik . 2022. Physically Unclonable Functions and AI . In Security and Artificial Intelligence . Springer , 85--106. Fatemeh Ganji and Shahin Tajik. 2022. Physically Unclonable Functions and AI. In Security and Artificial Intelligence. Springer, 85--106."},{"key":"e_1_3_2_1_29_1","volume-title":"Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version). Journal of Cryptographic Engineering","author":"Ganji Fatemeh","year":"2020","unstructured":"Fatemeh Ganji , Shahin Tajik , Pascal Stauss , Jean-Pierre Seifert , Mark Tehranipoor , and Domenic Forte . 2020. Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version). Journal of Cryptographic Engineering ( 2020 ). https:\/\/doi.org\/10.1007\/s13389-020-00226--7 10.1007\/s13389-020-00226--7 Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark Tehranipoor, and Domenic Forte. 2020. Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version). Journal of Cryptographic Engineering (2020). https:\/\/doi.org\/10.1007\/s13389-020-00226--7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140247"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"e_1_3_2_1_34_1","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Grand Joe","year":"2014","unstructured":"Joe Grand . 2014 . Printed circuit board deconstruction techniques . In 8th USENIX Workshop on Offensive Technologies (WOOT 14) . Joe Grand. 2014. Printed circuit board deconstruction techniques. In 8th USENIX Workshop on Offensive Technologies (WOOT 14)."},{"volume-title":"No place to hide: Edward Snowden, the NSA, and the US surveillance state","author":"Greenwald Glenn","key":"e_1_3_2_1_35_1","unstructured":"Glenn Greenwald . 2014. No place to hide: Edward Snowden, the NSA, and the US surveillance state . Macmillan . Glenn Greenwald. 2014. No place to hide: Edward Snowden, the NSA, and the US surveillance state. Macmillan."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_16"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2008.31"},{"volume-title":"InternationalWorkshop on Cryptographic Hardware and Embedded Systems","author":"G\u00fcneysu Tim","key":"e_1_3_2_1_38_1","unstructured":"Tim G\u00fcneysu and Amir Moradi . 2011. Generic side-channel countermeasures for reconfigurable devices . In InternationalWorkshop on Cryptographic Hardware and Embedded Systems . Springer , 33--48. Tim G\u00fcneysu and Amir Moradi. 2011. Generic side-channel countermeasures for reconfigurable devices. In InternationalWorkshop on Cryptographic Hardware and Embedded Systems. Springer, 33--48."},{"volume-title":"2011 International Conference on Reconfigurable Computing and FPGAs. IEEE, 217--222","author":"He Wei","key":"e_1_3_2_1_39_1","unstructured":"Wei He , Eduardo de la Torre, and Teresa Riesgo. 2011. A precharge-absorbed DPL logic for reducing early propagation effects on FPGA implementations . In 2011 International Conference on Reconfigurable Computing and FPGAs. IEEE, 217--222 . Wei He, Eduardo de la Torre, and Teresa Riesgo. 2011. A precharge-absorbed DPL logic for reducing early propagation effects on FPGA implementations. In 2011 International Conference on Reconfigurable Computing and FPGAs. IEEE, 217--222."},{"volume-title":"2012 International Conference on Reconfigurable Computing and FPGAs. IEEE, 1--6.","author":"He Wei","key":"e_1_3_2_1_40_1","unstructured":"Wei He , Andr\u00e9s Otero , Eduardo de la Torre, and Teresa Riesgo. 2012. Automatic generation of identical routing pairs for FPGA implemented DPL logic . In 2012 International Conference on Reconfigurable Computing and FPGAs. IEEE, 1--6. Wei He, Andr\u00e9s Otero, Eduardo de la Torre, and Teresa Riesgo. 2012. Automatic generation of identical routing pairs for FPGA implemented DPL logic. In 2012 International Conference on Reconfigurable Computing and FPGAs. IEEE, 1--6."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516717"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_16"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00041"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"e_1_3_2_1_47_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 260--263","author":"Hettwer Benjamin","year":"2019","unstructured":"Benjamin Hettwer , Johannes Petersen , Stefan Gehrer , Heike Neumann , and Tim G\u00fcneysu . 2019 . Securing cryptographic circuits by exploiting implementation diversity and partial reconfiguration on FPGAs. In 2019 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 260--263 . Benjamin Hettwer, Johannes Petersen, Stefan Gehrer, Heike Neumann, and Tim G\u00fcneysu. 2019. Securing cryptographic circuits by exploiting implementation diversity and partial reconfiguration on FPGAs. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 260--263."},{"key":"e_1_3_2_1_48_1","volume-title":"Intelligent Machine Homicide. In Intrl. Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, 249--264","author":"Heuser Annelie","year":"2012","unstructured":"Annelie Heuser and Michael Zohner . 2012 . Intelligent Machine Homicide. In Intrl. Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, 249--264 . Annelie Heuser and Michael Zohner. 2012. Intelligent Machine Homicide. In Intrl. Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, 249--264."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317899"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2566262"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2009.5412604"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2010.49"},{"key":"e_1_3_2_1_54_1","volume-title":"Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks. In International Symposium on Applied Reconfigurable Computing. Springer, 188--202","author":"Khan Nadir","year":"2021","unstructured":"Nadir Khan , Benjamin Hettwer , and J\u00fcrgen Becker . 2021 . Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks. In International Symposium on Applied Reconfigurable Computing. Springer, 188--202 . Nadir Khan, Benjamin Hettwer, and J\u00fcrgen Becker. 2021. Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks. In International Symposium on Applied Reconfigurable Computing. Springer, 188--202."},{"key":"e_1_3_2_1_55_1","volume-title":"Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. on Cryptographic Hardware and Embedded Systems","author":"Kim Jaehun","year":"2019","unstructured":"Jaehun Kim , Stjepan Picek , Annelie Heuser , Shivam Bhasin , and Alan Hanjalic . 2019. Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. on Cryptographic Hardware and Embedded Systems ( 2019 ), 148--179. Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, and Alan Hanjalic. 2019. Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. on Cryptographic Hardware and Embedded Systems (2019), 148--179."},{"volume-title":"Annual international cryptology conference","author":"Kocher Paul","key":"e_1_3_2_1_56_1","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential power analysis . In Annual international cryptology conference . Springer , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388--397."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00029"},{"key":"e_1_3_2_1_59_1","volume-title":"30th USENIX Security Symposium (USENIX Security . 627--644","author":"Krachenfels Thilo","year":"2021","unstructured":"Thilo Krachenfels , Tuba Kiyan , Shahin Tajik , and Jean-Pierre Seifert . 2021 . Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks . In 30th USENIX Security Symposium (USENIX Security . 627--644 . Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, and Jean-Pierre Seifert. 2021. Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. In 30th USENIX Security Symposium (USENIX Security . 627--644."},{"key":"e_1_3_2_1_60_1","volume-title":"CPAmap: on the complexity of secure FPGA virtualization, multi-tenancy, and physical design. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Krautter Jonas","year":"2020","unstructured":"Jonas Krautter , Dennis Gnad , and Mehdi Tahoori . 2020. CPAmap: on the complexity of secure FPGA virtualization, multi-tenancy, and physical design. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2020 ), 121--146. Jonas Krautter, Dennis Gnad, and Mehdi Tahoori. 2020. CPAmap: on the complexity of secure FPGA virtualization, multi-tenancy, and physical design. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 121--146."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942094"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3005338"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2048400"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_8"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.573-595"},{"key":"e_1_3_2_1_67_1","volume-title":"Automation & Test in Europe Conference & Exhibition. IEEE, 634--639","author":"Lomn\u00e9 Victor","year":"2009","unstructured":"Victor Lomn\u00e9 , Philippe Maurine , Lionel Torres , Michel Robert , Rafael Soares , and Ney Calazans . 2009 . Evaluation on FPGA of triple rail logic robustness against DPA and DEMA. In 2009 Design , Automation & Test in Europe Conference & Exhibition. IEEE, 634--639 . Victor Lomn\u00e9, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, and Ney Calazans. 2009. Evaluation on FPGA of triple rail logic robustness against DPA and DEMA. In 2009 Design, Automation & Test in Europe Conference & Exhibition. IEEE, 634--639."},{"key":"e_1_3_2_1_68_1","volume-title":"2008 International Conference on Field-Programmable Technology. IEEE, 201--208","author":"Lu Yingxi","year":"2008","unstructured":"Yingxi Lu , Maire P O'Neill , and John V McCanny . 2008 . FPGA implementation and analysis of random delay insertion countermeasure against DPA . In 2008 International Conference on Field-Programmable Technology. IEEE, 201--208 . Yingxi Lu, Maire P O'Neill, and John V McCanny. 2008. FPGA implementation and analysis of random delay insertion countermeasure against DPA. In 2008 International Conference on Field-Programmable Technology. IEEE, 201--208."},{"volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"Maes Roel","key":"e_1_3_2_1_69_1","unstructured":"Roel Maes . 2013. Physically Unclonable Functions: Constructions, Properties and Applications . Springer Berlin Heidelberg . Roel Maes. 2013. Physically Unclonable Functions: Constructions, Properties and Applications. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAMOS.2017.8344639"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_22"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_33"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_23"},{"key":"e_1_3_2_1_74_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE","author":"Nassar Maxime","year":"2010","unstructured":"Maxime Nassar , Shivam Bhasin , Jean-Luc Danger , Guillaume Duc , and Sylvain Guilley . 2010 . BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation. In 2010 Design , Automation & Test in Europe Conference & Exhibition (DATE 2010). IEEE, 849--854. Maxime Nassar, Shivam Bhasin, Jean-Luc Danger, Guillaume Duc, and Sylvain Guilley. 2010. BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation. In 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010). IEEE, 849--854."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"volume-title":"Cryptographers' track at the RSA conference","author":"Osvik Dag Arne","key":"e_1_3_2_1_76_1","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006. Cache attacks and countermeasures: the case of AES . In Cryptographers' track at the RSA conference . Springer , 1--20. Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In Cryptographers' track at the RSA conference. Springer, 1--20."},{"volume-title":"Bootstrapping trust in modern computers","author":"Parno Bryan","key":"e_1_3_2_1_77_1","unstructured":"Bryan Parno , Jonathan M McCune , and Adrian Perrig . 2011. Bootstrapping trust in modern computers . Springer Science & Business Media . Bryan Parno, Jonathan M McCune, and Adrian Perrig. 2011. Bootstrapping trust in modern computers. Springer Science & Business Media."},{"key":"e_1_3_2_1_78_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 97--102","author":"Patnaik Satwik","year":"2018","unstructured":"Satwik Patnaik , Nikhil Rangarajan , Johann Knechtel , Ozgur Sinanoglu , and Shaloo Rakheja . 2018 . Advancing hardware security using polymorphic and stochastic spin-hall effect devices. In 2018 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 97--102 . Satwik Patnaik, Nikhil Rangarajan, Johann Knechtel, Ozgur Sinanoglu, and Shaloo Rakheja. 2018. Advancing hardware security using polymorphic and stochastic spin-hall effect devices. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 97--102."},{"key":"e_1_3_2_1_79_1","volume-title":"Article 82 (aug","author":"Pawlick Jeffrey","year":"2019","unstructured":"Jeffrey Pawlick , Edward Colbert , and Quanyan Zhu . 2019. A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. ACM Comput. Surv. 52, 4 , Article 82 (aug 2019 ), 28 pages. https:\/\/doi.org\/10. 1145\/3337772 Jeffrey Pawlick, Edward Colbert, and Quanyan Zhu. 2019. A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. ACM Comput. Surv. 52, 4, Article 82 (aug 2019), 28 pages. https:\/\/doi.org\/10. 1145\/3337772"},{"key":"e_1_3_2_1_80_1","first-page":"1","article-title":"The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations","volume":"2019","author":"Picek Stjepan","year":"2019","unstructured":"Stjepan Picek , Annelie Heuser , Alan Jovic , Shivam Bhasin , and Francesco Regazzoni . 2019 . The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations . IACR Trans. on Cryptographic Hardware and Embedded Systems 2019 , 1 (2019), 1 -- 29 . Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, and Francesco Regazzoni. 2019. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Trans. on Cryptographic Hardware and Embedded Systems 2019, 1 (2019), 1--29.","journal-title":"IACR Trans. on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_81_1","volume-title":"SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch","author":"Picek Stjepan","year":"2021","unstructured":"Stjepan Picek , Guilherme Perin , Luca Mariot , Lichao Wu , and Lejla Batina . 2021. SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch ., 2021 \/1092 (2021). Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, and Lejla Batina. 2021. SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch., 2021\/1092 (2021)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_6"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_13"},{"key":"e_1_3_2_1_84_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 123--141","author":"Poussier Romain","year":"2017","unstructured":"Romain Poussier , Qian Guo , Fran\u00e7ois-Xavier Standaert , Claude Carlet , and Sylvain Guilley . 2017 . Connecting and improving direct sum masking and inner product masking . In International Conference on Smart Card Research and Advanced Applications. Springer, 123--141 . Romain Poussier, Qian Guo, Fran\u00e7ois-Xavier Standaert, Claude Carlet, and Sylvain Guilley. 2017. Connecting and improving direct sum masking and inner product masking. In International Conference on Smart Card Research and Advanced Applications. Springer, 123--141."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300258"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"e_1_3_2_1_88_1","volume-title":"Opening the doors to dynamic camouflaging: Harnessing the power of polymorphic devices","author":"Rangarajan Nikhil","year":"2020","unstructured":"Nikhil Rangarajan , Satwik Patnaik , Johann Knechtel , Ramesh Karri , Ozgur Sinanoglu , and Shaloo Rakheja . 2020. Opening the doors to dynamic camouflaging: Harnessing the power of polymorphic devices . IEEE Transactions on Emerging Topics in Computing ( 2020 ). Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ramesh Karri, Ozgur Sinanoglu, and Shaloo Rakheja. 2020. Opening the doors to dynamic camouflaging: Harnessing the power of polymorphic devices. IEEE Transactions on Emerging Topics in Computing (2020)."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00118"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446997"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_13"},{"key":"e_1_3_2_1_92_1","unstructured":"J Robertson and M Riley. 2018. The Big Hack: How China Used a Tiny Chip to Infiltrate US Companies. Bloomberg. (2018).  J Robertson and M Riley. 2018. The Big Hack: How China Used a Tiny Chip to Infiltrate US Companies. Bloomberg. (2018)."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2749226"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Sasdrich Pascal","key":"e_1_3_2_1_94_1","unstructured":"Pascal Sasdrich , Amir Moradi , and Tim G\u00fcneysu . 2017. Hiding higher-order side-channel leakage . In Cryptographers' Track at the RSA Conference . Springer , 131--146. Pascal Sasdrich, Amir Moradi, and Tim G\u00fcneysu. 2017. Hiding higher-order side-channel leakage. In Cryptographers' Track at the RSA Conference. Springer, 131--146."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140251"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2009.58"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3063306"},{"key":"e_1_3_2_1_98_1","volume-title":"COSADE 2010 First International Workshop on Constructive SideChannel Analysis and Secure Design.","author":"Schimmel Oliver","year":"2010","unstructured":"Oliver Schimmel , Paul Duplys , Eberhard Boehl , Jan Hayek , Robert Bosch , and Wolfgang Rosenstiel . 2010 . Correlation power analysis in frequency domain . In COSADE 2010 First International Workshop on Constructive SideChannel Analysis and Secure Design. Oliver Schimmel, Paul Duplys, Eberhard Boehl, Jan Hayek, Robert Bosch, and Wolfgang Rosenstiel. 2010. Correlation power analysis in frequency domain. In COSADE 2010 First International Workshop on Constructive SideChannel Analysis and Secure Design."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495575"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45572-3_8"},{"key":"e_1_3_2_1_102_1","volume-title":"22nd Chaos Communication Congr.","author":"Steil Michael","year":"2005","unstructured":"Michael Steil . 2005 . 17 mistakes Microsoft made in the Xbox security system . In 22nd Chaos Communication Congr. Michael Steil. 2005. 17 mistakes Microsoft made in the Xbox security system. In 22nd Chaos Communication Congr."},{"volume-title":"Open Problems in Mathematics and Computational Science","author":"Stipevi Mario","key":"e_1_3_2_1_103_1","unstructured":"Mario Stipevi and \u00c7etin Kaya Ko\u00e7 . 2014. True random number generators . In Open Problems in Mathematics and Computational Science . Springer , 275--315. Mario Stipevi and \u00c7etin Kaya Ko\u00e7. 2014. True random number generators. In Open Problems in Mathematics and Computational Science. Springer, 275--315."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20040503"},{"key":"e_1_3_2_1_105_1","volume-title":"Polymorphic Electronics. In ICES2001 4th International Conference on Evolvable Systems: From Biology to Hardware. 291--301","author":"Stoica Adrian","year":"2001","unstructured":"Adrian Stoica , Ricardo Zebulum , and Didier Keymeulen . 2001 . Polymorphic Electronics. In ICES2001 4th International Conference on Evolvable Systems: From Biology to Hardware. 291--301 . https:\/\/doi.org\/10.1007\/3--540--45443--8_26 10.1007\/3--540--45443--8_26 Adrian Stoica, Ricardo Zebulum, and Didier Keymeulen. 2001. Polymorphic Electronics. In ICES2001 4th International Conference on Evolvable Systems: From Biology to Hardware. 291--301. https:\/\/doi.org\/10.1007\/3--540--45443--8_26"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_21"},{"key":"e_1_3_2_1_107_1","volume-title":"Random switching logic: A countermeasure against DPA based on transition probability. Cryptology ePrint Archive","author":"Suzuki Daisuke","year":"2004","unstructured":"Daisuke Suzuki , Minoru Saeki , and Tetsuya Ichikawa . 2004. Random switching logic: A countermeasure against DPA based on transition probability. Cryptology ePrint Archive ( 2004 ). Daisuke Suzuki, Minoru Saeki, and Tetsuya Ichikawa. 2004. Random switching logic: A countermeasure against DPA based on transition probability. Cryptology ePrint Archive (2004)."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_27"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_27"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2015.19"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2014.64"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"volume-title":"Counterfeit Integrated Circuits: Detection and Avoidance","author":"Tehranipoor Mark","key":"e_1_3_2_1_114_1","unstructured":"Mark (Mohammad) Tehranipoor , Ujjwal Guin , and Domenic Forte . 2015. Counterfeit Integrated Circuits: Detection and Avoidance . Springer International Publishing . Mark (Mohammad) Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit Integrated Circuits: Detection and Avoidance. Springer International Publishing."},{"key":"e_1_3_2_1_115_1","volume-title":"Proceedings of the 28th European solid-state circuits conference. IEEE, 403--406","author":"Tiri Kris","year":"2002","unstructured":"Kris Tiri , Moonmoon Akmal , and Ingrid Verbauwhede . 2002 . A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards . In Proceedings of the 28th European solid-state circuits conference. IEEE, 403--406 . Kris Tiri, Moonmoon Akmal, and Ingrid Verbauwhede. 2002. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In Proceedings of the 28th European solid-state circuits conference. IEEE, 403--406."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"vanWoudenberg Jasper GJ","key":"e_1_3_2_1_118_1","unstructured":"Jasper GJ vanWoudenberg , Marc F Witteman , and Bram Bakker . 2011. Improving differential power analysis by elastic alignment . In Cryptographers' Track at the RSA Conference . Springer , 104--119. Jasper GJ vanWoudenberg, Marc F Witteman, and Bram Bakker. 2011. Improving differential power analysis by elastic alignment. In Cryptographers' Track at the RSA Conference. Springer, 104--119."},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_24"},{"key":"e_1_3_2_1_120_1","volume-title":"Automation & Test in Europe Conference & Exhibition. IEEE, 1--6.","author":"Verbauwhede Ingrid","year":"2007","unstructured":"Ingrid Verbauwhede and Patrick Schaumont . 2007 . Design methods for security and trust. In 2007 Design , Automation & Test in Europe Conference & Exhibition. IEEE, 1--6. Ingrid Verbauwhede and Patrick Schaumont. 2007. Design methods for security and trust. In 2007 Design, Automation & Test in Europe Conference & Exhibition. IEEE, 1--6."},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"e_1_3_2_1_122_1","unstructured":"Mladen A. Vouk Annie I. Ant\u00f3n and Jim Yuill. 2006. Defensive computersecurity deception operations: processes principles and techniques.  Mladen A. Vouk Annie I. Ant\u00f3n and Jim Yuill. 2006. Defensive computersecurity deception operations: processes principles and techniques."},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870866"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297288"},{"volume-title":"Survey of cyber moving targets","author":"Ward Bryan","key":"e_1_3_2_1_126_1","unstructured":"Bryan C Ward , Steven R Gomez , Richard Skowyra , David Bigelow , Jason Martin , James Landry , and Hamed Okhravi . 2018. Survey of cyber moving targets second edition. Technical Report. MIT Lincoln Laboratory Lexington United States . Bryan CWard, Steven R Gomez, Richard Skowyra, David Bigelow, Jason Martin, James Landry, and Hamed Okhravi. 2018. Survey of cyber moving targets second edition. Technical Report. MIT Lincoln Laboratory Lexington United States."},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2651829"},{"key":"e_1_3_2_1_128_1","volume-title":"Toward A Federal Cybersecurity Research Agenda: Three Game-Changing Themes. [Online] https:\/\/www.nitrd.gov\/documents\/cybersecurity\/documents\/NITRDCybersecurit yRDThemes20100519.pdf [Accessed: Sept.9","author":"Wing Jeanette","year":"2022","unstructured":"Jeanette Wing , Douglas Maughan , Patricia Muoio , and Carl Landwehr . 2010. Toward A Federal Cybersecurity Research Agenda: Three Game-Changing Themes. [Online] https:\/\/www.nitrd.gov\/documents\/cybersecurity\/documents\/NITRDCybersecurit yRDThemes20100519.pdf [Accessed: Sept.9 , 2022 ]. (2010). Jeanette Wing, Douglas Maughan, Patricia Muoio, and Carl Landwehr. 2010. Toward A Federal Cybersecurity Research Agenda: Three Game-Changing Themes. [Online] https:\/\/www.nitrd.gov\/documents\/cybersecurity\/documents\/NITRDCybersecurit yRDThemes20100519.pdf [Accessed: Sept.9, 2022]. (2010)."},{"key":"e_1_3_2_1_129_1","first-page":"1293","article-title":"I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis","volume":"2020","author":"Perin Guilherme","year":"2020","unstructured":"LichaoWu, Guilherme Perin , and Stjepan Picek . 2020 . I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis . IACR Cryptol. ePrint Arch. 2020 (2020), 1293 . LichaoWu, Guilherme Perin, and Stjepan Picek. 2020. I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020 (2020), 1293.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_130_1","volume-title":"Programmable ro (pro): A multipurpose countermeasure against side-channel and fault injection attack. arXiv preprint arXiv:2106.13784","author":"Yao Yuan","year":"2021","unstructured":"Yuan Yao , Pantea Kiaei , Richa Singh , Shahin Tajik , and Patrick Schaumont . 2021. Programmable ro (pro): A multipurpose countermeasure against side-channel and fault injection attack. arXiv preprint arXiv:2106.13784 ( 2021 ). Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, and Patrick Schaumont. 2021. Programmable ro (pro): A multipurpose countermeasure against side-channel and fault injection attack. arXiv preprint arXiv:2106.13784 (2021)."},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383891"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754386.1754390"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289816.1289831"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3172222"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2018.8357320"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383907"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 9th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560828.3564010","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560828.3564010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564010"}},"subtitle":["Design Challenges and Opportunities"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":135,"alternative-id":["10.1145\/3560828.3564010","10.1145\/3560828"],"URL":"https:\/\/doi.org\/10.1145\/3560828.3564010","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}