{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:45:52Z","timestamp":1758980752003,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"US Department of Commerce (NIST)","award":["70NANB18H219"],"award-info":[{"award-number":["70NANB18H219"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623987","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"5-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2154-2963","authenticated-orcid":false,"given":"Eduardo","family":"Ferrufino","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5257-4662","authenticated-orcid":false,"given":"Luke","family":"Beckwith","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8032-6012","authenticated-orcid":false,"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[{"name":"PQSecure Technologies, Boca Raton, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7036-6433","authenticated-orcid":false,"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994788"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530347"},{"key":"e_1_3_2_1_3_1","unstructured":"George Mason University Cryptographic Engineering Research Group. 2022. Assignments Commitments and Reports of the LWC Side-Channel Security Evaluation Labs Targeting Hardware Implementations. https:\/\/cryptography.gmu.edu\/athena\/LWC\/Lab_Implementation_Matching_HW.html.  George Mason University Cryptographic Engineering Research Group. 2022. Assignments Commitments and Reports of the LWC Side-Channel Security Evaluation Labs Targeting Hardware Implementations. https:\/\/cryptography.gmu.edu\/athena\/LWC\/Lab_Implementation_Matching_HW.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--68351--3_18"},{"key":"e_1_3_2_1_5_1","volume-title":"NIST Non-invasive Attack Testing Workshop","author":"Goodwill Gilbert","year":"2011","unstructured":"Gilbert Goodwill , Benjamin Jun , Josh Jaffe , and Pankaj Rohatgi . 2011 . A Testing Methodology for Side\u00ad-Channel Resistance Validation . In NIST Non-invasive Attack Testing Workshop . Nara, Japan. Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. A Testing Methodology for Side\u00ad-Channel Resistance Validation. In NIST Non-invasive Attack Testing Workshop. Nara, Japan."},{"key":"e_1_3_2_1_6_1","volume-title":"Side-Channel AttacK User Reference Architecture Board SAKURA-G. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE ). IEEE","author":"Guntur Hendra","year":"2014","unstructured":"Hendra Guntur , Jun Ishii , and Akashi Satoh . 2014 . Side-Channel AttacK User Reference Architecture Board SAKURA-G. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE ). IEEE , Tokyo, Japan, 271--274. Hendra Guntur, Jun Ishii, and Akashi Satoh. 2014. Side-Channel AttacK User Reference Architecture Board SAKURA-G. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE ). IEEE, Tokyo, Japan, 271--274."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCSI38923.2020.9191655"},{"key":"e_1_3_2_1_9_1","unstructured":"Jens-Peter Kaps William Diehl Michael Tempelmeier Ekawat Homsirikamol and Kris Gaj. 2022. Hardware API for Lightweight Cryptography v1.1 (with support for SCA-protected implementations). https:\/\/cryptography.gmu.edu\/athena\/LWC\/LWC_HW_API_v1_1.pdf.  Jens-Peter Kaps William Diehl Michael Tempelmeier Ekawat Homsirikamol and Kris Gaj. 2022. Hardware API for Lightweight Cryptography v1.1 (with support for SCA-protected implementations). https:\/\/cryptography.gmu.edu\/athena\/LWC\/LWC_HW_API_v1_1.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"First International Workshop on constructive side channel analysis an secure design. COSADE.","author":"Katashita Toshihiro","year":"2010","unstructured":"Toshihiro Katashita , Akashi Satoh , Katsuya Kikuchi , Hiroshi Nakagawa , and Masahiro Aoyagi . 2010 . Evaluation of DPA charactersitics of SASEBO for board level simulations . In First International Workshop on constructive side channel analysis an secure design. COSADE. Toshihiro Katashita, Akashi Satoh, Katsuya Kikuchi, Hiroshi Nakagawa, and Masahiro Aoyagi. 2010. Evaluation of DPA charactersitics of SASEBO for board level simulations. In First International Workshop on constructive side channel analysis an secure design. COSADE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.589--629"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132694"},{"key":"e_1_3_2_1_14_1","unstructured":"NewAE. 2014. OpenADC Product Datasheet. http:\/\/newae.com\/files\/openadc-datasheet.pdf.  NewAE. 2014. OpenADC Product Datasheet. http:\/\/newae.com\/files\/openadc-datasheet.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2014.7002214"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2011.5782630"},{"key":"e_1_3_2_1_18_1","unstructured":"Robert Primas. 2020. NIST LWC Hardware Reference Implementation of Ascon v1.2. https:\/\/github.com\/ascon\/ascon-hardware  Robert Primas. 2020. NIST LWC Hardware Reference Implementation of Ascon v1.2. https:\/\/github.com\/ascon\/ascon-hardware"},{"key":"e_1_3_2_1_19_1","unstructured":"Rambus. 2019. DPA Workstation Analysis Platform - Rambus. https:\/\/www.rambus.com\/security\/dpa-countermeasures\/dpa-workstation-platform\/.  Rambus. 2019. DPA Workstation Analysis Platform - Rambus. https:\/\/www.rambus.com\/security\/dpa-countermeasures\/dpa-workstation-platform\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Riscure. 2019. Side Channel Analysis Security Tools. https:\/\/www.riscure.com\/security-tools\/inspector-sca\/.  Riscure. 2019. Side Channel Analysis Security Tools. https:\/\/www.riscure.com\/security-tools\/inspector-sca\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Ruhr-University Bochum. [n.d.]. Chair for Security Engineering GitHub. https:\/\/github.com\/Chair-for-Security-Engineering\/LWC-Masking.  Ruhr-University Bochum. [n.d.]. Chair for Security Engineering GitHub. https:\/\/github.com\/Chair-for-Security-Engineering\/LWC-Masking."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Tobias Schneider and Amir Moradi. 2015. Leakage Assessment Methodology - a Clear Roadmap for Side-Channel Evaluations. Cryptology ePrint Archive 2015\/207.  Tobias Schneider and Amir Moradi. 2015. Leakage Assessment Methodology - a Clear Roadmap for Side-Channel Evaluations. Cryptology ePrint Archive 2015\/207.","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"e_1_3_2_1_23_1","unstructured":"T. Steinbauer R. Nagpal R. Primas and S. Mangard. 2022. TVLA On Selected NIST LWC Finalists. Technical Report.  T. Steinbauer R. Nagpal R. Primas and S. Mangard. 2022. TVLA On Selected NIST LWC Finalists. Technical Report."},{"key":"e_1_3_2_1_24_1","unstructured":"The Xoodyak Team. 2021. Unprotected Hardware Xoodyak Implantation. https:\/\/github.com\/KeccakTeam\/Xoodoo.  The Xoodyak Team. 2021. Unprotected Hardware Xoodyak Implantation. https:\/\/github.com\/KeccakTeam\/Xoodoo."},{"key":"e_1_3_2_1_25_1","volume-title":"Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE","author":"Velegalati Rajesh","year":"2012","unstructured":"Rajesh Velegalati and Jens-Peter Kaps . 2012 . Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis. Work in Progress (WiP) , Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012. Rajesh Velegalati and Jens-Peter Kaps. 2012. Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis. Work in Progress (WiP), Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012."},{"key":"e_1_3_2_1_26_1","unstructured":"C. Zhao H. Zhao W. Yang W. Zhu and L. Liu. 2022. Leakage Assessment Report for Xoodyak R3 First Order. Technical Report. io  C. Zhao H. Zhao W. Yang W. Zhu and L. Liu. 2022. Leakage Assessment Report for Xoodyak R3 First Order. Technical Report. io"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":24,"alternative-id":["10.1145\/3605769.3623987","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623987","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}