{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:31:25Z","timestamp":1763724685712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T00:00:00Z","timestamp":1694908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,17]]},"DOI":"10.1145\/3607888.3608963","type":"proceedings-article","created":{"date-parts":[[2024,1,20]],"date-time":"2024-01-20T02:05:26Z","timestamp":1705716326000},"page":"8-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Special Session: Mitigating Side-channel Attacks through Circuit to Application Layer Approaches"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4588-5303","authenticated-orcid":false,"given":"Nima","family":"Kavand","sequence":"first","affiliation":[{"name":"TU Dresden, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9174-8158","authenticated-orcid":false,"given":"Armin","family":"Darjani","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2972-438X","authenticated-orcid":false,"given":"Jens","family":"Trommer","sequence":"additional","affiliation":[{"name":"Namlab gGmbH, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6997-5370","authenticated-orcid":false,"given":"Giulio","family":"Galderisi","sequence":"additional","affiliation":[{"name":"Namlab gGmbH, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3814-0378","authenticated-orcid":false,"given":"Thomas","family":"Mikolajick","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Saxony, Germany"},{"name":"Namlab gGmbH, Dresden, Saxony, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3286-4722","authenticated-orcid":false,"given":"Nicolai","family":"Mueller","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, North Rhine-Westphalia, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4032-7433","authenticated-orcid":false,"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, North Rhine-Westphalia, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8942-7384","authenticated-orcid":false,"given":"Chongzhou","family":"Fang","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4545-5016","authenticated-orcid":false,"given":"Ning","family":"Miao","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0254-9246","authenticated-orcid":false,"given":"Han","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4417-2387","authenticated-orcid":false,"given":"Sai Manoj","family":"Pudukotai Dinakarrao","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8904-4699","authenticated-orcid":false,"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"UC Davis, Davis, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2164-6316","authenticated-orcid":false,"given":"Benjamin","family":"Hettwer","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Renningen, Baden-wuerttemberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7516-978X","authenticated-orcid":false,"given":"Luca","family":"Parrini","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Renningen, Baden-wuerttemberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7125-1737","authenticated-orcid":false,"given":"Akash","family":"Kumar","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Saxony, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Real time detection of spectre and meltdown attacks using machine learning. arXiv preprint arXiv:2006.01442","author":"Ahmad Bilal Ali","year":"2020","unstructured":"Bilal Ali Ahmad. 2020. Real time detection of spectre and meltdown attacks using machine learning. arXiv preprint arXiv:2006.01442 (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Gilles Barthe Sonia Bela\u00efd Fran\u00e7ois Dupressoir Pierre-Alain Fouque Benjamin Gr\u00e9goire Pierre-Yves Strub and R\u00e9becca Zucchini. 2016. Strong Non-Interference and Type-Directed Higher-Order Masking. In CCS. ACM 116--129.","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_3_1","volume-title":"CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In USENIX Security 19. 515--532.","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In USENIX Security 19. 515--532."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2086696.2086699","article-title":"An architecture-independent instruction shuffler to protect against side-channel attacks","volume":"8","author":"Bayrak Ali Galip","year":"2012","unstructured":"Ali Galip Bayrak, Nikola Velickovic, Paolo Ienne, and Wayne Burleson. 2012. An architecture-independent instruction shuffler to protect against side-channel attacks. TACO 8, 4 (2012), 1--19.","journal-title":"TACO"},{"volume-title":"Leverage emerging technologies for DPA-resilient block cipher design","author":"Bi Yu","key":"e_1_3_2_1_5_1","unstructured":"Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Francois-Xavier Standaert, and Yier Jin. 2016. Leverage emerging technologies for DPA-resilient block cipher design. In DATE. IEEE, 1538--1543."},{"key":"e_1_3_2_1_6_1","volume-title":"Hardware Private Circuits: From Trivial Composition to Full Verification","author":"Cassiers Ga\u00ebtan","year":"2021","unstructured":"Ga\u00ebtan Cassiers, Benjamin Gr\u00e9goire, Itamar Levi, and Fran\u00e7ois-Xavier Standaert. 2021. Hardware Private Circuits: From Trivial Composition to Full Verification. IEEE TC (2021)."},{"key":"e_1_3_2_1_7_1","first-page":"2542","article-title":"Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference","volume":"15","author":"Cassiers Ga\u00ebtan","year":"2020","unstructured":"Ga\u00ebtan Cassiers and Fran\u00e7ois-Xavier Standaert. 2020. Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. IEEE TIFS 15 (2020), 2542--2555.","journal-title":"IEEE TIFS"},{"key":"e_1_3_2_1_8_1","volume-title":"CRYPTO 1999 (LNCS","volume":"412","author":"Chari Suresh","year":"1999","unstructured":"Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In CRYPTO 1999 (LNCS, Vol. 1666). Springer, 398--412."},{"key":"e_1_3_2_1_9_1","volume-title":"Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen.","author":"Das Debayan","year":"2017","unstructured":"Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. 2017. High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In HOST. IEEE, 62--67."},{"volume-title":"CR-Spectre: Defense-aware ROP Injected Code-Reuse based Dynamic Spectre","author":"Dhavlle Abhijitt","key":"e_1_3_2_1_10_1","unstructured":"Abhijitt Dhavlle, Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao. 2022. CR-Spectre: Defense-aware ROP Injected Code-Reuse based Dynamic Spectre. In ACM\/IEEE DATE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Abhijitt Dhavlle Raj Mehta Setareh Rafatirad Houman Homayoun and Sai Manoj Pudukotai Dinakarrao. 2020. Entropy-Shield:Side-Channel Entropy Maximizationfor Timing-based Side-Channel Attacks. In ACM\/EDAA\/IEEE ISQED.","DOI":"10.1109\/ISQED48828.2020.9137008"},{"key":"e_1_3_2_1_12_1","volume-title":"Imitating Functional Operations for Mitigating Side-Channel Leakage","author":"Dhavlle Abhijitt","year":"2021","unstructured":"Abhijitt Dhavlle, Setareh Rafatirad, Khaled Khasawneh, Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao. 2021. Imitating Functional Operations for Mitigating Side-Channel Leakage. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2021)."},{"key":"e_1_3_2_1_13_1","volume-title":"Rosario Cammarota, and Aydin Aysu.","author":"Dubey Anuj","year":"2022","unstructured":"Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, and Aydin Aysu. 2022. Modulonet: Neural networks meet modular arithmetic for efficient hardware masking. IACR TCHES (2022), 506--556."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Anuj Dubey Rosario Cammarota and Aydin Aysu. 2020. BoMaNet: Boolean masking of an entire neural network. In ICCAD. 1--9.","DOI":"10.1145\/3400302.3415649"},{"key":"e_1_3_2_1_15_1","volume-title":"Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. IACR TCHES 2018","author":"Faust Sebastian","year":"2018","unstructured":"Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, and Fran\u00e7ois-Xavier Standaert. 2018. Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. IACR TCHES 2018, 3 (2018), 89--120."},{"key":"e_1_3_2_1_16_1","volume-title":"Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, and Georg Sigl.","author":"Fritzmann Tim","year":"2022","unstructured":"Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, and Georg Sigl. 2022. Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. IACR TCHES (2022), 414--460."},{"key":"e_1_3_2_1_17_1","volume-title":"Insights into the Temperature-Dependent Switching Behavior of Three-Gated Reconfigurable Field-Effect Transistors. physica status solidi (a)","author":"Galderisi Giulio","year":"2023","unstructured":"Giulio Galderisi, Christoph Beyer, Thomas Mikolajick, and Jens Trommer. 2023. Insights into the Temperature-Dependent Switching Behavior of Three-Gated Reconfigurable Field-Effect Transistors. physica status solidi (a) (2023)."},{"key":"e_1_3_2_1_18_1","first-page":"107","article-title":"Reconfigurable field effect transistors design solutions for delay-invariant logic gates","volume":"14","author":"Galderisi Giulio","year":"2022","unstructured":"Giulio Galderisi, Thomas Mikolajick, and Jens Trommer. 2022. Reconfigurable field effect transistors design solutions for delay-invariant logic gates. ESL 14, 2 (2022), 107--110.","journal-title":"ESL"},{"volume-title":"Differential power analysis mitigation technique using three-independent-gate field effect transistors","author":"Giacomin Edouard","key":"e_1_3_2_1_19_1","unstructured":"Edouard Giacomin and Pierre-Emmanuel Gaillardon. 2018. Differential power analysis mitigation technique using three-independent-gate field effect transistors. In IFIP\/IEEE VLSI-SoC. IEEE, 107--112."},{"key":"e_1_3_2_1_20_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Hannes Gro\u00df Stefan Mangard and Thomas Korak. 2016. Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order. In TIS@CCS. ACM 3.","DOI":"10.1145\/2996366.2996426"},{"volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Gruss Daniel","key":"e_1_3_2_1_22_1","unstructured":"Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 279--299."},{"key":"e_1_3_2_1_23_1","volume-title":"Dually active silicon nanowire transistors and circuits with equal electron and hole transport. Nano letters 13, 9","author":"Heinzig Andr\u00e9","year":"2013","unstructured":"Andr\u00e9 Heinzig, Thomas Mikolajick, Jens Trommer, Daniel Grimm, and Walter M Weber. 2013. Dually active silicon nanowire transistors and circuits with equal electron and hole transport. Nano letters 13, 9 (2013), 4176--4181."},{"key":"e_1_3_2_1_24_1","unstructured":"Gary Hilson. 2023. AI Must Be Secured at the Silicon Level. https:\/\/www.eetimes.com\/ai-must-be-secured-at-the-silicon-level\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy. 52--61","author":"Hu W.-M.","year":"1992","unstructured":"W.-M. Hu. 1992. Lattice scheduling and covert channels. In Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy. 52--61."},{"key":"e_1_3_2_1_26_1","volume-title":"Deepsniffer: A dnn model extraction framework based on learning architectural hints. In ASPLOS. 385--399.","author":"Hu Xing","year":"2020","unstructured":"Xing Hu, Ling Liang, Shuangchen Li, Lei Deng, Pengfei Zuo, Yu Ji, Xinfeng Xie, Yufei Ding, Chang Liu, Timothy Sherwood, et al. 2020. Deepsniffer: A dnn model extraction framework based on learning architectural hints. In ASPLOS. 385--399."},{"volume-title":"A survey on convolutional neural network accelerators: GPU","author":"Hu Yunxiang","key":"e_1_3_2_1_27_1","unstructured":"Yunxiang Hu, Yuhao Liu, and Zhuovuan Liu. 2022. A survey on convolutional neural network accelerators: GPU, FPGA and ASIC. In ICCRD. IEEE, 100--107."},{"key":"e_1_3_2_1_28_1","volume-title":"CRYPTO 2003 (LNCS","volume":"481","author":"Ishai Yuval","unstructured":"Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In CRYPTO 2003 (LNCS, Vol. 2729). Springer, 463--481."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Monodeep Kar Arvind Singh Sanu Mathew Anand Rajan Vivek De and Saibal Mukhopadhyay. 2017. 8.1 Improved power-side-channel-attack resistance of an AES-128 core via a security-aware integrated buck voltage regulator. In ISSCC. IEEE 142--143.","DOI":"10.1109\/ISSCC.2017.7870301"},{"volume-title":"Securing Hardware through Reconfigurable Nano-Structures","author":"Kavand Nima","key":"e_1_3_2_1_30_1","unstructured":"Nima Kavand, Armin Darjani, Shubham Rai, and Akash Kumar. 2022. Securing Hardware through Reconfigurable Nano-Structures. In IEEE\/ACM ICCAD. 1--7."},{"key":"e_1_3_2_1_31_1","volume-title":"Design of Energy-efficient RFET-based Exact and Approximate 4: 2 Compressors and Multipliers","author":"Kavand Nima","year":"2023","unstructured":"Nima Kavand, Armin Darjani, Shubham Rai, and Akash Kumar. 2023. Design of Energy-efficient RFET-based Exact and Approximate 4: 2 Compressors and Multipliers. IEEE TCAS-II (2023)."},{"key":"e_1_3_2_1_32_1","article-title":"La cryptographie militaire","author":"Kerckhoffs A.","year":"1883","unstructured":"A. Kerckhoffs. 1883. La cryptographie militaire. Journal des Sciences Militaires (1883), 161--191.","journal-title":"Journal des Sciences Militaires (1883), 161--191."},{"volume-title":"An Energy-Efficient Three-Independent-Gate FET Cell Library for Low-Power Edge Computing","author":"Keyser Michael","key":"e_1_3_2_1_33_1","unstructured":"Michael Keyser, Roman Gauchi, and Pierre-Emmanuel Gaillardon. 2022. An Energy-Efficient Three-Independent-Gate FET Cell Library for Low-Power Edge Computing. In IFIP\/IEEE VLSI-SoC. IEEE, 1--6."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"David Knichel and Amir Moradi. 2022. Low-Latency Hardware Private Circuits. In ACM CCS. ACM 1799--1812.","DOI":"10.1145\/3548606.3559362"},{"key":"e_1_3_2_1_35_1","volume-title":"Automated Generation of Masked Hardware. IACR TCHES 2022","author":"Knichel David","year":"2022","unstructured":"David Knichel, Amir Moradi, Nicolai M\u00fcller, and Pascal Sasdrich. 2022. Automated Generation of Masked Hardware. IACR TCHES 2022, 1 (2022), 589--629."},{"key":"e_1_3_2_1_36_1","volume-title":"SILVER - Statistical Independence and Leakage Verification. In ASIACRYPT 2020 (LNCS","volume":"816","author":"Knichel David","year":"2020","unstructured":"David Knichel, Pascal Sasdrich, and Amir Moradi. 2020. SILVER - Statistical Independence and Leakage Verification. In ASIACRYPT 2020 (LNCS, Vol. 12491). Springer, 787--816."},{"key":"e_1_3_2_1_37_1","volume-title":"Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets. IACR TCHES 2022","author":"Knichel David","year":"2022","unstructured":"David Knichel, Pascal Sasdrich, and Amir Moradi. 2022. Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets. IACR TCHES 2022, 1 (2022), 323--344."},{"key":"e_1_3_2_1_38_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. 1--19","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. 1--19."},{"key":"e_1_3_2_1_39_1","volume-title":"Advances in Cryptology---CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings 19","author":"Kocher Paul","year":"1999","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Advances in Cryptology---CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15--19, 1999 Proceedings 19. Springer, 388--397."},{"key":"e_1_3_2_1_40_1","volume-title":"Advances in Cryptology---CRYPTO'96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18--22, 1996 Proceedings 16","author":"Kocher Paul C","year":"1996","unstructured":"Paul C Kocher. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology---CRYPTO'96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18--22, 1996 Proceedings 16. Springer, 104--113."},{"key":"e_1_3_2_1_41_1","unstructured":"Congmiao Li and Jean-Luc Gaudiot. 2018. Online Detection of Spectre Attacks Using Microarchitectural Traces from Performance Counters. In SBAC-PAD. 25--28."},{"key":"e_1_3_2_1_42_1","volume-title":"Meltdown: Reading Kernel Memory from User Space. In USENIX Security","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In USENIX Security. USENIX Association, Baltimore, MD, 973--990."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Steffen M\u00e4rcker Michael Raitza Shubham Rai Giulio Galderisi Thomas Mikolajick Jens Trommer and Akash Kumar. 2023. Formal Analysis of Camouflaged Reconfigurable Circuits. In NEWCAS. 1--4.","DOI":"10.1109\/NEWCAS57931.2023.10198196"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","first-page":"6790","DOI":"10.3390\/app11156790","article-title":"Physical side-channel attacks on embedded neural networks: A survey","volume":"11","author":"Real Maria M\u00e9ndez","year":"2021","unstructured":"Maria M\u00e9ndez Real and Ruben Salvador. 2021. Physical side-channel attacks on embedded neural networks: A survey. Applied Sciences 11, 15 (2021), 6790.","journal-title":"Applied Sciences"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"T Mikolajick G Galderisi S Rai M Simon R B\u00f6ckle M Sistani C Cakirlar N Bhattacharjee T Mauersberger A Heinzig et al. 2022. Reconfigurable field effect transistors: A technology enablers perspective. Solid-State Electronics (2022) 108381.","DOI":"10.1016\/j.sse.2022.108381"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sse.2021.108036"},{"key":"e_1_3_2_1_47_1","unstructured":"Kamyar Mohajerani Luke Beckwith Abubakr Abdulgadir Eduardo Ferrufino Jens-Peter Kaps and Kris Gaj. 2023. SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process. Cryptology ePrint Archive Paper 2023\/484."},{"key":"e_1_3_2_1_48_1","volume-title":"PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR TCHES 2022","author":"M\u00fcller Nicolai","year":"2022","unstructured":"Nicolai M\u00fcller and Amir Moradi. 2022. PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR TCHES 2022, 4 (2022), 311--348."},{"volume-title":"Emerging Computing: From Devices to Systems: Looking Beyond Moore and Von Neumann","author":"Mutlu Onur","key":"e_1_3_2_1_49_1","unstructured":"Onur Mutlu, Saugata Ghose, Juan G\u00f3mez-Luna, and Rachata Ausavarungnirun. 2022. A modern primer on processing in memory. In Emerging Computing: From Devices to Systems: Looking Beyond Moore and Von Neumann. Springer, 171--243."},{"key":"e_1_3_2_1_50_1","volume-title":"Threshold Implementations Against Side-Channel Attacks and Glitches. In ICICS 2006 (LNCS","volume":"545","author":"Nikova Svetla","year":"2006","unstructured":"Svetla Nikova, Christian Rechberger, and Vincent Rijmen. 2006. Threshold Implementations Against Side-Channel Attacks and Glitches. In ICICS 2006 (LNCS, Vol. 4307). Springer, 529--545."},{"volume-title":"Cache attacks and counter-measures: the case of AES","author":"Osvik Dag Arne","key":"e_1_3_2_1_51_1","unstructured":"Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and counter-measures: the case of AES. In CT-RSA. Springer, 1--20."},{"volume-title":"Automated Detection of Spectre and Meltdown Attacks Using Explainable Machine Learning","author":"Pan Zhixin","key":"e_1_3_2_1_52_1","unstructured":"Zhixin Pan and Prabhat Mishra. 2021. Automated Detection of Spectre and Meltdown Attacks Using Explainable Machine Learning. In IEEE HOST. 24--34."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102561"},{"key":"e_1_3_2_1_54_1","first-page":"560","article-title":"Designing efficient circuits based on runtime-reconfigurable field-effect transistors","volume":"27","author":"Rai Shubham","year":"2018","unstructured":"Shubham Rai, Jens Trommer, Michael Raitza, Thomas Mikolajick, Walter M Weber, and Akash Kumar. 2018. Designing efficient circuits based on runtime-reconfigurable field-effect transistors. IEEE TVLSI 27, 3 (2018), 560--572.","journal-title":"IEEE TVLSI"},{"volume-title":"Arithmetic Addition over Boolean Masking: Towards First-and Second-Order Resistance in Hardware","author":"Schneider Tobias","key":"e_1_3_2_1_55_1","unstructured":"Tobias Schneider, Amir Moradi, and Tim G\u00fcneysu. 2015. Arithmetic Addition over Boolean Masking: Towards First-and Second-Order Resistance in Hardware. In ACNS. Springer, 559--578."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Mohammad Mehdi Sharifi Ramin Rajaei Patsy Cadareanu Pierre-Emmanuel Gaillardon Yier Jin Michael T Niemier and Xiaobo Sharon Hu. 2020. A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks.. In DATE. 1253--1258.","DOI":"10.23919\/DATE48585.2020.9116554"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Zhongkai Tong Ziyuan Zhu Zhanpeng Wang Limin Wang Yusha Zhang and Yuxin Liu. 2020. Cache side-channel attacks detection based on machine learning. In TrustCom. 919--926.","DOI":"10.1109\/TrustCom50675.2020.00123"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Han Wang Hossein Sayadi Avesta Sasan Setareh Rafatirad Tinoosh Mohsenin and Houman Homayoun. 2020. Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks. In GLSVLSI. 181--186.","DOI":"10.1145\/3386263.3407586"},{"key":"e_1_3_2_1_60_1","volume-title":"Side-channel attack analysis on in-memory computing architectures. TETC","author":"Wang Ziyu","year":"2023","unstructured":"Ziyu Wang, Fan-hsuan Meng, Yongmo Park, Jason K Eshraghian, and Wei D Lu. 2023. Side-channel attack analysis on in-memory computing architectures. TETC (2023)."},{"key":"e_1_3_2_1_61_1","volume-title":"Xiaobo Sharon Hu, and Joerg Appenzeller","author":"Wu Peng","year":"2021","unstructured":"Peng Wu, Dayane Reis, Xiaobo Sharon Hu, and Joerg Appenzeller. 2021. Two-dimensional transistors with reconfigurable polarities for secure circuits. NATURE electronics 4, 1 (2021), 45--53."},{"key":"e_1_3_2_1_62_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution Low Noise L3 Cache Side-Channel Attack. In USENIX security. 719--732."},{"key":"e_1_3_2_1_63_1","unstructured":"Kota Yoshida Takaya Kubota Mitsuru Shiozaki and Takeshi Fujino. [n. d.]. Model-extraction attack against FPGA-DNN accelerator utilizing correlation electromagnetic analysis. In FCCM."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2014.2359112"}],"event":{"name":"CODES\/ISSS '23 Companion: 2023 International Conference on Hardware\/Software Codesign and System Synthesis","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","CEDA","IEEE CAS"],"location":"Hamburg Germany","acronym":"CODES\/ISSS '23 Companion"},"container-title":["Proceedings of the 2023 International Conference on Hardware\/Software Codesign and System Synthesis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607888.3608963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607888.3608963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:06Z","timestamp":1750178226000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607888.3608963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,17]]},"references-count":64,"alternative-id":["10.1145\/3607888.3608963","10.1145\/3607888"],"URL":"https:\/\/doi.org\/10.1145\/3607888.3608963","relation":{},"subject":[],"published":{"date-parts":[[2023,9,17]]},"assertion":[{"value":"2024-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}