{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:38:45Z","timestamp":1772242725946,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1916722"],"award-info":[{"award-number":["CNS-1916722"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2225160"],"award-info":[{"award-number":["CNS-2225160"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2238680"],"award-info":[{"award-number":["CNS-2238680"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2150086"],"award-info":[{"award-number":["CNS-2150086"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678900","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"630-643","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3619-5848","authenticated-orcid":false,"given":"Mabon","family":"Ninan","sequence":"first","affiliation":[{"name":"University of Cincinnati, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4015-8569","authenticated-orcid":false,"given":"Evan","family":"Nimmo","sequence":"additional","affiliation":[{"name":"University of Cincinnati, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6816-8606","authenticated-orcid":false,"given":"Shane","family":"Reilly","sequence":"additional","affiliation":[{"name":"University of Cincinnati, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4003-7799","authenticated-orcid":false,"given":"Channing","family":"Smith","sequence":"additional","affiliation":[{"name":"College of Charleston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0458-0092","authenticated-orcid":false,"given":"Wenhai","family":"Sun","sequence":"additional","affiliation":[{"name":"Purdue University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8973-2328","authenticated-orcid":false,"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6074-535X","authenticated-orcid":false,"given":"John M.","family":"Emmert","sequence":"additional","affiliation":[{"name":"University of Cincinnati, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"e_1_3_2_1_3_1","volume-title":"2014 International Symposium on Electromagnetic Compatibility.","author":"Bhasin S.","unstructured":"S. Bhasin, J. Danger, S. Guilley, and Z. Najm. 2014. NICV: Normalized inter-class variance for detection of side-channel leakage. In 2014 International Symposium on Electromagnetic Compatibility."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of CHES\u201904","author":"Brier E.","unstructured":"E. Brier, C. Clavier, and F. Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Proc. of CHES\u201904."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of CHES\u201917","author":"Cagli E.","unstructured":"E. Cagli, C. Dumas, and E. Prouff. 2017. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. In Proc. of CHES\u201917."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.27-56"},{"key":"e_1_3_2_1_7_1","volume-title":"Template Attacks. In Proc. of Cryptographic Hardware and Embeeded Systems (CHES","author":"Chari S.","year":"2002","unstructured":"S. Chari, J.\u00a0R. Rao, and P. Rohatgi. 2002. Template Attacks. In Proc. of Cryptographic Hardware and Embeeded Systems (CHES 2002)."},{"key":"e_1_3_2_1_8_1","volume-title":"SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing","author":"Danial J.","year":"2020","unstructured":"J. Danial, D. Das, S. Ghosh, A. Raychowdhury, and S. Sen. 2020. SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing. IEEE Access (2020)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of 56th ACM\/IEEE Design Automation Conference (DAC\u201919)","author":"Das D.","unstructured":"D. Das, A. Golder, J. Danial, S. Ghosh, A. Raychowdhury, and S. Sen. 2019. X-DeepSCA: Cross-Device Deep Learning Side Channel Attack. In Proc. of 56th ACM\/IEEE Design Automation Conference (DAC\u201919)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0030-6"},{"key":"e_1_3_2_1_12_1","volume-title":"The Use of Multiple Measurements in Taxonomic Problems. Annals of Eugenics","author":"Fisher A.","year":"1936","unstructured":"R.\u00a0A. Fisher. 1936. The Use of Multiple Measurements in Taxonomic Problems. Annals of Eugenics (1936)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Y. Ganin E. Ustinova H. Ajakan P. Germain H. Larochelle F. Laviolette M. Marchand and V. Lempitsky. 2016. Domain-Adversarial Tranining of Neural Networks. Journal of Machine Learning Research (2016).","DOI":"10.1007\/978-3-319-58347-1_10"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of International Conference on Cryptology and Information Security in Latin America (Latin Crypt\u201921)","author":"Genevey-Metat C.","unstructured":"C. Genevey-Metat, A. Heuser, and B. Gerard. 2021. Train or Adapt a Deeply Learned Profile?. In Proc. of International Conference on Cryptology and Information Security in Latin America (Latin Crypt\u201921)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926324"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the International Conference on Nerual Information Processing Systems (NIPS","author":"Goodfellow I.","year":"2014","unstructured":"I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. 2014. Generative Adversarial Networks. In Proc. of the International Conference on Nerual Information Processing Systems (NIPS 2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. Hajra S. Chowdhury and D. Mukhopadhyay. 2024. EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. TCHES (2024).","DOI":"10.46586\/tches.v2024.i1.336-374"},{"key":"e_1_3_2_1_18_1","series-title":"Springer Series in Statistics (2002)","volume-title":"Principal Componenet Analysis","author":"Jolliffe I.T.","unstructured":"I.T. Jolliffe. 2002. Principal Componenet Analysis. Springer Series in Statistics (2002)."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of CRYPTO\u201999","author":"Kocher P.","unstructured":"P. Kocher, J. Jaffe, and B. Jun. 1999. Differential Power Analysis. In Proc. of CRYPTO\u201999."},{"key":"e_1_3_2_1_20_1","unstructured":"P. Kulkarni V. Verneuil S. Picek and L. Batina. [n. d.]. Order vs. Chaos: A Language Model Approach for Side-channel Attacks. ([n. d.]). https:\/\/eprint.iacr.org\/2023\/1615.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D. Kwon H. Kim and S. Hong. 2021. Non-Profiled Deep Learning-based Side-Channel Preprocessing with Autoencoders. IEEE Access (2021).","DOI":"10.1109\/ACCESS.2021.3072653"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545382"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"L. Lin D. Zhu J. Wen H. Chen Y. Lu N. Cheng C. Chow H. Shrivastav C.\u00a0W. Chen K. Monta and M. Nagata. 2021. Multiphysics Simulation of EM Side-Channels from Silicon Backside with ML-based Auto-POI Identification. In IEEE HOST\u201921.","DOI":"10.1109\/HOST49136.2021.9702270"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHost).","author":"Lu X.","unstructured":"X. Lu, C. Zhang, and D. Gu. 2021. Attention - Based Non-Profiled Side-Channel Attack. In Proc. of 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHost)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE\u201916)","author":"Maghrebi H.","unstructured":"H. Maghrebi, T. Portigliatti, and E. Proff. 2016. Breaking cryptographic implementations using deep learning techniques. In Proc. of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE\u201916)."},{"key":"e_1_3_2_1_26_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"Mangard Stefan","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer New York."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-023-00311-7"},{"key":"e_1_3_2_1_28_1","volume-title":"Improving cross-device attacks using zero-mean unit-variance normalization. Journal of Cryptographic Engineering","author":"Montminy P.","year":"2013","unstructured":"D.\u00a0P. Montminy, R.\u00a0O. Baldwin, M.\u00a0A. Temple, and E.\u00a0D. Laspe. 2013. Improving cross-device attacks using zero-mean unit-variance normalization. Journal of Cryptographic Engineering (2013)."},{"key":"e_1_3_2_1_29_1","unstructured":"S. Nouraniboosjin and F. Ganji. [n. d.]. Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. ([n. d.]). https:\/\/eprint.iacr.org\/2024\/071.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"M. Panoff H. Yu H. Shan and Y. Jin. 2022. A Review and Comparison of AI-enhanced Side Channel Analysis. J. Emerg. Technol. Comput. Syst. (2022).","DOI":"10.1145\/3517810"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"K. Papagiannopoulos O. Glamocanin M. Azouaoui D. Ros F. Regazzoni and M. Stojilovic. 2023. The Side-channel Metrics Cheat Sheet. ACM Computing Surveys 55 10 (2023).","DOI":"10.1145\/3565571"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"G. Perin L. Wu and S. Picek. 2022. Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis. Artificial Intelligence for Cybersecurity (Springer) (2022).","DOI":"10.1007\/978-3-030-97087-1_9"},{"key":"e_1_3_2_1_33_1","first-page":"209","article-title":"The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations","volume":"1","author":"Picek S.","year":"2019","unstructured":"S. Picek, A. Heuser, A. Jovic, and F. Regazzoni. 2019. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Transactions on Cryptographic Hardware and Embedded Systems 1 (2019), 209\u2013237.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"S. Picek G. Perin L. Mariot L. Wu and L. Batina. 2023. SoK: Deep Learning-based Physical Side-channel Analysis. ACM Computing Surveys 55 11 (2023).","DOI":"10.1145\/3569577"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"P. Ravi D. Jap S. Bhasin and A. Chattopadhyay. [n. d.]. Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A case Study of Kyber KEM. ([n. d.]). https:\/\/eprint.iacr.org\/2024\/169.","DOI":"10.46586\/tches.v2024.i2.795-818"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"A. Rezaeezade A. Basurto-Becerra L. Weissbart and G. Perin. [n. d.]. One for All All for Ascon: Ensemble-based Deep Learning Side-channel Analysis. ([n. d.]). https:\/\/eprint.iacr.org\/2023\/1922.pdf.","DOI":"10.1007\/978-3-031-61486-6_9"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"J. Rijsdijk L. Wu G. Perin and S. Picek. 2021. Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021).","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of AFRICACRYPT","author":"Rioja U.","year":"2020","unstructured":"U. Rioja, L. Batina, and I. Armendariz. 2020. When Similarities Among Devices are Taken for Granted: Another Look at Portability. In Proc. of AFRICACRYPT 2020. 337 \u2013 357."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"H. Saurabh A. Golder S.\u00a0S. Titti S. Kundu C. Li A. Karmakar and D. Das. [n. d.]. SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V. ([n. d.]). https:\/\/eprint.iacr.org\/2024\/428.pdf.","DOI":"10.1109\/HOST55342.2024.10545384"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"I. Savu M. Krcek G. Perin L. Wu and S. Picek. [n. d.]. The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. ([n. d.]). https:\/\/eprint.iacr.org\/2023\/1681.pdf.","DOI":"10.1007\/978-3-031-57543-3_7"},{"key":"e_1_3_2_1_41_1","volume-title":"Improving Side-Channel Leakage Assessment Using Pre-Silicon Leakage. In International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE).","author":"Shanmugam D.","unstructured":"D. Shanmugam and P. Schaumont. 2023. Improving Side-Channel Leakage Assessment Using Pre-Silicon Leakage. In International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"F. Standaert B. Gierlichs and I. Verbauwhede. 2008. Partition v.s. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. In Information Security and Cryptology \u2013 ICISC 2008.","DOI":"10.1007\/978-3-642-00730-9_16"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.107-131"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Tzeng E.","unstructured":"E. Tzeng, J. Hoffman, K. Saenko, and T. Darrell. 2017. Adversarial Discriminative Domain Adaptation. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_45_1","volume-title":"Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis. In International Workshop on Constructive Side-Channel Analysis and Secure Design.","author":"van\u00a0der Valk D.","unstructured":"D. van\u00a0der Valk, S. Picek, and S. Bhasin. 2020. Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis. In International Workshop on Constructive Side-Channel Analysis and Secure Design."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133495"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590177"},{"key":"e_1_3_2_1_48_1","volume-title":"How Diversity Affects Deep-Learning Side-Channel Attacks. In 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC).","author":"Wang H.","unstructured":"H. Wang, M. Brisfors, S. Forsmark, and E. Dubrova. 2019. How Diversity Affects Deep-Learning Side-Channel Attacks. In 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"L. Wu A. Ali-Pour A. Rezaeezade G. Perin and S. Picek. [n. d.]. Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. ([n. d.]). https:\/\/eprint.iacr.org\/2023\/1110.","DOI":"10.62056\/ay4c3txol7"},{"key":"e_1_3_2_1_50_1","unstructured":"T. Yap S. Bhasin and L. Weissbart. [n. d.]. Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. ([n. d.]). https:\/\/eprint.iacr.org\/2024\/170.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"T. Yap and D. Jap. [n. d.]. Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. ([n. d.]). https:\/\/eprint.iacr.org\/2024\/167.pdf.","DOI":"10.1007\/978-3-031-61486-6_7"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of the 58th ACM\/IEEE Design Automation Conference (DAC\u201921)","author":"Yu H.","unstructured":"H. Yu, H. Shan, M. Panoff, and Y. Jin. 2021. Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning. In Proc. of the 58th ACM\/IEEE Design Automation Conference (DAC\u201921)."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of IEEE HOST\u201923","author":"Yu H.","unstructured":"H. Yu, S. Wang, H. Shan, M. Panoff, M. Lee, K. Yang, and Y. Jin. 2023. Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis. In Proc. of IEEE HOST\u201923."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of 57th ACM\/IEEE Design Automation Conference (DAC\u201920)","author":"Zhang F.","unstructured":"F. Zhang, B. Shao, G. Xu, B. Yang, Z. Yang, Z. Qin, and K. Ren. 2020. From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Anlysis across Devices. In Proc. of 57th ACM\/IEEE Design Automation Conference (DAC\u201920)."}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678900","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3678890.3678900","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678900"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":54,"alternative-id":["10.1145\/3678890.3678900","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678900","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}