{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:54:36Z","timestamp":1761015276018,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-21-1-0320"],"award-info":[{"award-number":["W911NF-21-1-0320"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623988","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Better Side-Channel Attacks Through Measurements"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0442-0106","authenticated-orcid":false,"given":"Alok K.","family":"Singh","sequence":"first","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0876-1181","authenticated-orcid":false,"given":"Ryan M.","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"unstructured":"2011. Side-Channel Attack Standard Evaluation Board SASEBO-W Specification. http:\/\/www.toptdc.com\/en\/product\/sasebo\/  2011. Side-Channel Attack Standard Evaluation Board SASEBO-W Specification. http:\/\/www.toptdc.com\/en\/product\/sasebo\/","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/SDS57574.2022.10062906"},{"doi-asserted-by":"crossref","unstructured":"Melissa Azouaoui Davide Bellizia Ileana Buhan Nicolas Debande S\u00e9bastien Duval Christophe Giraud \u00c9liane Jaulmes Fran\u00e7ois Koeune Elisabeth Oswald Fran\u00e7ois-Xavier Standaert etal 2020. A systematic appraisal of side channel evaluation strategies. In Security Standardisation Research (SSR)  Melissa Azouaoui Davide Bellizia Ileana Buhan Nicolas Debande S\u00e9bastien Duval Christophe Giraud \u00c9liane Jaulmes Fran\u00e7ois Koeune Elisabeth Oswald Fran\u00e7ois-Xavier Standaert et al. 2020. A systematic appraisal of side channel evaluation strategies. In Security Standardisation Research (SSR)","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-030-64357-7_3"},{"unstructured":"Analog Devices. 2005. 270 MHz Differential Receiver Amplifiers. Datasheet.  Analog Devices. 2005. 270 MHz Differential Receiver Amplifiers. Datasheet.","key":"e_1_3_2_1_4_1"},{"volume-title":"Fundamentals of power electronics","author":"Erickson Robert W","unstructured":"Robert W Erickson and Dragan Maksimovic . 2007. Fundamentals of power electronics . Springer Science & Business Media . Robert W Erickson and Dragan Maksimovic. 2007. Fundamentals of power electronics. Springer Science & Business Media.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1002\/app.29812"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1088\/0143-0807\/31\/3\/003"},{"unstructured":"Texas Instruments. 2023. Tiva? TM4C123GH6PM Microcontroller. Datasheet.  Texas Instruments. 2023. Tiva? TM4C123GH6PM Microcontroller. Datasheet.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Workshop on RFID Security.","author":"Kasper T","year":"2009","unstructured":"T Kasper , D Oswald , and C Paar . 2009 . New methods for cost-effective sidechannel attacks on cryptographic RFIDs . In Workshop on RFID Security. T Kasper, D Oswald, and C Paar. 2009. New methods for cost-effective sidechannel attacks on cryptographic RFIDs. In Workshop on RFID Security."},{"volume-title":"Data acquisition and signal processing for smart sensors","author":"Kirianaki Nikolay V","unstructured":"Nikolay V Kirianaki , Sergey Y Yurish , Nestor O Shpak , and Vadim P Deynega . 2002. Data acquisition and signal processing for smart sensors . Wiley New York . Nikolay V Kirianaki, Sergey Y Yurish, Nestor O Shpak, and Vadim P Deynega. 2002. Data acquisition and signal processing for smart sensors. Wiley New York.","key":"e_1_3_2_1_10_1"},{"volume-title":"Advances in Cryptology","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential Power Analysis . In Advances in Cryptology . Springer , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology. Springer, 388--397.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Introduction to differential power analysis. Journal of Cryptographic Engineering 1","author":"Kocher Paul","year":"2011","unstructured":"Paul Kocher , Joshua Jaffe , Benjamin Jun , and Pankaj Rohatgi . 2011. Introduction to differential power analysis. Journal of Cryptographic Engineering 1 ( 2011 ). Paul Kocher, Joshua Jaffe, Benjamin Jun, and Pankaj Rohatgi. 2011. Introduction to differential power analysis. Journal of Cryptographic Engineering 1 (2011)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1080\/23742917.2016.1231523"},{"volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . 2008. Power analysis attacks: Revealing the secrets of smart cards . Vol. 31 . Springer . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer.","key":"e_1_3_2_1_14_1"},{"unstructured":"Hammond Manufacturing. 2023. EMI\/RFI Shielded Enclosures. Datasheet.  Hammond Manufacturing. 2023. EMI\/RFI Shielded Enclosures. Datasheet.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","volume-title":"International Journal of Computer Network and Information Security","author":"Mestiri Hassen","year":"2013","unstructured":"Hassen Mestiri , Noura Benhadjyoussef , Mohsen Machhout , and Rached Tourki . 2013. A comparative study of power consumption models for cpa attack . International Journal of Computer Network and Information Security ( 2013 ). Hassen Mestiri, Noura Benhadjyoussef, Mohsen Machhout, and Rached Tourki. 2013. A comparative study of power consumption models for cpa attack. International Journal of Computer Network and Information Security (2013)."},{"unstructured":"Microchip. 2021. Maximizing the signal.  Microchip. 2021. Maximizing the signal.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","volume-title":"Habil.-Schr.","author":"Moradi Amir","year":"2016","unstructured":"Amir Moradi . 2016 . Advances in side-channel security. Ph. D. Dissertation. Bochum, Ruhr-Universit\u00e4t Bochum , Habil.-Schr. , 2015. Amir Moradi. 2016. Advances in side-channel security. Ph. D. Dissertation. Bochum, Ruhr-Universit\u00e4t Bochum, Habil.-Schr., 2015."},{"unstructured":"Colin O'Flynn and Zhizhang (David) Chen. 2014. ChipWhisperer. In Constructive Side-Channel Analysis and Secure Design.  Colin O'Flynn and Zhizhang (David) Chen. 2014. ChipWhisperer. In Constructive Side-Channel Analysis and Secure Design.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Syed Hamid Nawab, and Jian-Jiun Ding","author":"Oppenheim Alan V","year":"1997","unstructured":"Alan V Oppenheim , Alan S Willsky , Syed Hamid Nawab, and Jian-Jiun Ding . 1997 . Signals and systems. Vol. 2 . Prentice hall. Alan V Oppenheim, Alan S Willsky, Syed Hamid Nawab, and Jian-Jiun Ding. 1997. Signals and systems. Vol. 2. Prentice hall."},{"volume-title":"Topics in Cryptology","author":"Oswald Elisabeth","unstructured":"Elisabeth Oswald , Stefan Mangard , Christoph Herbst , and Stefan Tillich . 2006. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers . In Topics in Cryptology . Springer , Berlin, Heidelberg . Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. 2006. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In Topics in Cryptology. Springer, Berlin, Heidelberg.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1007\/s11704-020-0209-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/s13389-014-0087-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TFUZZ.2022.3172991"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/Radioelek.2014.6828434"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of Austrochip.","author":"Plos Thomas","year":"2008","unstructured":"Thomas Plos , Michael Hutter , and Christoph Herbst . 2008 . Enhancing sidechannel analysis with low-cost shielding techniques . In Proceedings of Austrochip. Thomas Plos, Michael Hutter, and Christoph Herbst. 2008. Enhancing sidechannel analysis with low-cost shielding techniques. In Proceedings of Austrochip."},{"unstructured":"Rambus Press. 2021. Side-channel attacks explained.  Rambus Press. 2021. Side-channel attacks explained.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"Gaussian probability density functions: Properties and error characterization","author":"Ribeiro Maria Isabel","year":"2004","unstructured":"Maria Isabel Ribeiro . 2004. Gaussian probability density functions: Properties and error characterization . Institute for Systems and Robotics , Portugal ( 2004 ). Maria Isabel Ribeiro. 2004. Gaussian probability density functions: Properties and error characterization. Institute for Systems and Robotics, Portugal (2004)."},{"volume-title":"Cryptographic Hardware and Embedded Systems (CHES)","author":"Schneider Tobias","unstructured":"Tobias Schneider and Amir Moradi . 2015. Leakage assessment methodology: A clear roadmap for side-channel evaluations . In Cryptographic Hardware and Embedded Systems (CHES) . Springer . Tobias Schneider and Amir Moradi. 2015. Leakage assessment methodology: A clear roadmap for side-channel evaluations. In Cryptographic Hardware and Embedded Systems (CHES). Springer.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","volume-title":"Improving the Rules of the DPA Contest. Cryptology EPrint Archive","author":"Standaert Fran\u00e7ois-Xavier","year":"2008","unstructured":"Fran\u00e7ois-Xavier Standaert , Philippe Bulens , Giacomo de Meulenaer , and Nicolas Veyrat-Charvillon . 2008. Improving the Rules of the DPA Contest. Cryptology EPrint Archive ( 2008 ). Fran\u00e7ois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, and Nicolas Veyrat-Charvillon. 2008. Improving the Rules of the DPA Contest. Cryptology EPrint Archive (2008)."},{"volume-title":"Field Programmable Logic and Application","author":"Standaert Fran\u00e7ois-Xavier","unstructured":"Fran\u00e7ois-Xavier Standaert , Jean-Jacques Quisquater , and Bart Preneel . 2004. Power Analysis Attacks Against FPGA Implementations of the DES . In Field Programmable Logic and Application . Springer . Fran\u00e7ois-Xavier Standaert, Jean-Jacques Quisquater, and Bart Preneel. 2004. Power Analysis Attacks Against FPGA Implementations of the DES. In Field Programmable Logic and Application. Springer.","key":"e_1_3_2_1_31_1"},{"unstructured":"NewAE Technology. 2018. CW501 differential probe. Product Datasheet.  NewAE Technology. 2018. CW501 differential probe. Product Datasheet.","key":"e_1_3_2_1_32_1"},{"unstructured":"Tektronix. 2017. Tools to Boost Oscilloscope Measurement Resolution to More than 11 Bits. Application Note.  Tektronix. 2017. Tools to Boost Oscilloscope Measurement Resolution to More than 11 Bits. Application Note.","key":"e_1_3_2_1_33_1"},{"unstructured":"Tektronix. 2023. P6248 P6247 and P6246 Differential Probes. Product Datasheet.  Tektronix. 2023. P6248 P6247 and P6246 Differential Probes. Product Datasheet.","key":"e_1_3_2_1_34_1"},{"unstructured":"Tektronix. 2023. Passive Voltage Probes. Product Datasheet.  Tektronix. 2023. Passive Voltage Probes. Product Datasheet.","key":"e_1_3_2_1_35_1"},{"unstructured":"Rajesh Velegalati Jens-Peter Kaps etal 2013. Towards a flexible opensource board for side-channel analysis (fobos). Cryptographic architectures embedded in reconfigurable devices (2013).  Rajesh Velegalati Jens-Peter Kaps et al. 2013. Towards a flexible opensource board for side-channel analysis (fobos). Cryptographic architectures embedded in reconfigurable devices (2013).","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/TEMC.2013.2257796"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/GCRAIT55928.2022.00145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/EMC\/SI\/PI\/EMCEurope52599.2021.9559284"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '23","name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3605769.3623988","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623988","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":39,"alternative-id":["10.1145\/3605769.3623988","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623988","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}