{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:05Z","timestamp":1755225185975,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","funder":[{"name":"NSF","award":["2219810"],"award-info":[{"award-number":["2219810"]}]},{"name":"NSF","award":["2219810"],"award-info":[{"award-number":["2219810"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736216","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"1280-1293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2334-6130","authenticated-orcid":false,"given":"Zhenyuan","family":"Liu","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2250-7101","authenticated-orcid":false,"given":"Andrew","family":"Malnicof","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4859-6133","authenticated-orcid":false,"given":"Arna","family":"Roy","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4586-5476","authenticated-orcid":false,"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_1_2_2","first-page":"1105","volume-title":"Proc. Government Microcircuit Applications and Critical Technology Conference","author":"Ajayi T.","year":"2019","unstructured":"T. Ajayi, D. Blaauw, T.-B. Chan, C.-K. Cheng, V.\u00a0A. Chhabria, D.\u00a0K. Choo, M. Coltella, S. Dobre, R. Dreslinski, M. Foga\u00e7a, S. Hashemi, A. Hosny, A.\u00a0B. Kahng, M. Kim, J. Li, Z. Liang, U. Mallappa, P. Penzes, G. Pradipta, S. Reda, A. Rovinski, K. Samadi, S.\u00a0S. Sapatnekar, L. Saul, C. Sechen, V. Srinivas, W. Swartz, D. Sylvester, D. Urquhart, L. Wang, M. Woo, and B. Xu. 2019. OpenROAD: Toward a Self-Driving, Open-Source Digital Layout Implementation Tool Chain. In Proc. Government Microcircuit Applications and Critical Technology Conference. 1105\u20131110."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Alon Amid David Biancolin Abraham Gonzalez Daniel Grubb Sagar Karandikar Harrison Liew Albert Magyar Howard Mao Albert Ou Nathan Pemberton Paul Rigge Colin Schmidt John Wright Jerry Zhao Yakun\u00a0Sophia Shao Krste Asanovi\u0107 and Borivoje Nikoli\u0107. 2020. Chipyard: Integrated Design Simulation and Implementation Framework for Custom SoCs. IEEE Micro 40 4 (July 2020) 10\u201321. 10.1109\/MM.2020.2996616","DOI":"10.1109\/MM.2020.2996616"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64357-7_3"},{"key":"e_1_3_3_1_5_2","unstructured":"Leonid Azriel Julian Speith Nils Albartus Ran Ginosar Avi Mendelson and Christof Paar. 2021. A survey of algorithmic methods in IC reverse engineering. IACR Cryptol. ePrint Arch. (2021) 1278. https:\/\/eprint.iacr.org\/2021\/1278"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16763-3_5"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3637665"},{"key":"e_1_3_3_1_8_2","unstructured":"Daniel\u00a0J. Bernstein. 2005. Cache-timing attacks on AES. Technical Report (2005). https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517415"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23049-4_8"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Maicol Ciani Emanuele Parisi Alberto Musa Francesco Barchi Andrea Bartolini Ari Kulmala Rafail Psiakis Angelo Garofalo Andrea Acquaviva and Rossi Davide. 2024. Unleashing OpenTitan\u2019s Potential: a Silicon-Ready Embedded Secure Element for Root of Trust and Cryptographic Offloading. ACM Transactions on Embedded Computing Systems (Sept. 2024). 10.1145\/3690823","DOI":"10.1145\/3690823"},{"key":"e_1_3_3_1_13_2","unstructured":"Thomas\u00a0De Cnudde Beg\u00fcl Bilgin Benedikt Gierlichs Ventzislav Nikov Svetla Nikova and Vincent Rijmen. 2016. Does Coupling Affect the Security of Masked Implementations? IACR Cryptol. ePrint Arch. (2016) 1080. http:\/\/eprint.iacr.org\/2016\/1080"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Yann\u00a0Le Corre Johann Gro\u00dfsch\u00e4dl and Daniel Dinu. 2017. Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. IACR Cryptol. ePrint Arch. (2017) 1253. http:\/\/eprint.iacr.org\/2017\/1253","DOI":"10.1007\/978-3-319-89641-0_5"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Arnaud de Grandmaison Karine Heydemann and Quentin\u00a0L. Meunier. 2022. ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41 11 (2022) 3733\u20133744. 10.1109\/TCAD.2022.3197507","DOI":"10.1109\/TCAD.2022.3197507"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_10"},{"key":"e_1_3_3_1_18_2","unstructured":"Marc Fyrbiak Sebastian Strau\u00df Christian Kison Sebastian Wallat Malte Elson Nikol Rummel and Christof Paar. 2019. Hardware Reverse Engineering: Overview and Open Challenges. CoRR abs\/1910.01518 (2019). arXiv:https:\/\/arXiv.org\/abs\/1910.01518http:\/\/arxiv.org\/abs\/1910.01518"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Si Gao Ben Marshall Dan Page and Elisabeth Oswald. 2020. Share-slicing: Friend or Foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020 1 (2020) 152\u2013174. 10.13154\/TCHES.V2020.I1.152-174","DOI":"10.13154\/TCHES.V2020.I1.152-174"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07082-2_11"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"John Gaspoz and Siemen Dhooghe. 2023. Threshold Implementations in Software: Micro-architectural Leakages in Algorithms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023 2 (2023) 155\u2013179. 10.46586\/TCHES.V2023.I2.155-179","DOI":"10.46586\/TCHES.V2023.I2.155-179"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Andreas Gerstlauer Christian Haubelt Andy\u00a0D. Pimentel Todor\u00a0P. Stefanov Daniel\u00a0D. Gajski and J\u00dcrgen Teich. 2009. Electronic System-Level Synthesis Methodologies. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 28 10 (2009) 1517\u20131530. 10.1109\/TCAD.2009.2026356","DOI":"10.1109\/TCAD.2009.2026356"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"Ilias Giechaskiel Ken Eguro and Kasper\u00a0Bonne Rasmussen. 2019. Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks. ACM Trans. Reconfigurable Technol. Syst. 12 3 (2019) 11:1\u201311:29. 10.1145\/3322483","DOI":"10.1145\/3322483"},{"key":"e_1_3_3_1_25_2","first-page":"1469","volume-title":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","author":"Gigerl Barbara","year":"2021","unstructured":"Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, and Roderick Bloem. 2021. Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael\u00a0D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1469\u20131468. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/gigerl"},{"key":"e_1_3_3_1_26_2","volume-title":"Proceedings of the ACM Workshop on Theory of Implementation Security","author":"Gro\u00df Hannes","year":"2020","unstructured":"Hannes Gro\u00df, Stefan Mangard, and Thomas Korak. 2020. Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order. In Proceedings of the ACM Workshop on Theory of Implementation Security, Beg\u00fcl Bilgin, Svetla Nikova, and Vincent Rijmen (Eds.). ACM, New York, NY, USA."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"John\u00a0L. Hennessy and David\u00a0A. Patterson. 2019. A new golden age for computer architecture. Commun. ACM 62 2 (Jan. 2019) 48\u201360. 10.1145\/3282307","DOI":"10.1145\/3282307"},{"key":"e_1_3_3_1_28_2","unstructured":"International Organization for Standardization. 2016. Information technology \u2014 Security techniques \u2014 Testing methods for the mitigation of non-invasive attack classes against cryptographic modules. Standard ISO\/IEC 17825. Available at: https:\/\/www.iso.org\/standard\/63359.html."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9591-6_8"},{"key":"e_1_3_3_1_30_2","volume-title":"Caliptra: A Datacenter System on a Chip (SOC) Root of Trust (RoT)","author":"Kelly Bryan","year":"2022","unstructured":"Bryan Kelly, Andr\u00e9s Lagar-Cavilla, Jeff Andersen, Prabhu Jayana, Piotr Kwidzinski, Rob Strong, John Traver, Louis Ferraro, Ishwar Agarwal, Anjana Parthasarathy, Bharat Pillilli, Vishal Soni, Marius Schilder, Sudhir Mathane, Nathan Nadarajah, and Kor Nielsen. 2022. Caliptra: A Datacenter System on a Chip (SOC) Root of Trust (RoT). Technical Report. AMD, Google, Microsoft. http:\/\/www.opencompute.org\/participate\/legal-documents\/"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Charles\u00a0E. Leiserson Neil\u00a0C. Thompson Joel\u00a0S. Emer Bradley\u00a0C. Kuszmaul Butler\u00a0W. Lampson Daniel Sanchez and Tao\u00a0B. Schardl. 2020. There\u2019s plenty of room at the Top: What will drive computer performance after Moore\u2019s law? Science 368 6495 (2020) eaam9744. 10.1126\/science.aam9744 arXiv:https:\/\/www.science.org\/doi\/pdf\/10.1126\/science.aam9744","DOI":"10.1126\/science.aam9744"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105405"},{"key":"e_1_3_3_1_35_2","unstructured":"LowRISC. 2025. Ibex: A Small and Efficient RISC-V Core. https:\/\/github.com\/lowRISC\/ibex. Accessed: 2025-01-20."},{"key":"e_1_3_3_1_36_2","unstructured":"LowRISC Community and Contributors. 2023. OpenTitan: The First Open Source Silicon Root of Trust. Online: https:\/\/opentitan.org\/. Available at https:\/\/opentitan.org\/."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Nima Mahdion and Elisabeth Oswald. 2024. Efficiently Detecting Masking Flaws in Software Implementations. IACR Communications in Cryptology 1 3 (2024) 35. 10.62056\/ab89ksdja","DOI":"10.62056\/ab89ksdja"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415626"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Ben Marshall Dan Page and James Webb. 2021. MIRACLE: MIcRo-ArChitectural Leakage Evaluation. IACR Cryptol. ePrint Arch. (2021) 261. https:\/\/eprint.iacr.org\/2021\/261","DOI":"10.46586\/tches.v2022.i1.175-220"},{"key":"e_1_3_3_1_40_2","first-page":"199","volume-title":"26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017","author":"McCann David","year":"2017","unstructured":"David McCann, Elisabeth Oswald, and Carolyn Whitnall. 2017. Towards Practical Tools for Side Channel Aware Software Engineering: \u2019Grey Box\u2019 Modelling for Instruction Leakages. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 199\u2013216. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/mccann"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","unstructured":"Andres Meza Francesco Restuccia Jason Oberg Dominic Rizzo and Ryan Kastner. 2023. Security Verification of the OpenTitan Hardware Root of Trust. IEEE Security & Privacy 21 3 (2023) 27\u201336. 10.1109\/MSEC.2023.3251954","DOI":"10.1109\/MSEC.2023.3251954"},{"key":"e_1_3_3_1_42_2","volume-title":"Introduction to the Practice of Statistics (9th ed.)","author":"Moore David\u00a0S.","year":"2016","unstructured":"David\u00a0S. Moore, George\u00a0P. McCabe, and Bruce\u00a0A. Craig. 2016. Introduction to the Practice of Statistics (9th ed.). W. H. Freeman and Company, New York, NY."},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Thorben Moos and Amir Moradi. 2021. Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 3 (2021) 780\u2013805. 10.46586\/TCHES.V2021.I3.780-805","DOI":"10.46586\/TCHES.V2021.I3.780-805"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","unstructured":"K. Oul J. Melchert K. Sreedhar L. Truong G. Nyengele K. Zhang Q. Liu J. Setter P.-H. Chen Y. Mei M. Strange R. Daly C. Donovick A. Carsello T. Kong K. Feng D. Huff A. Nayak R. Setaluri J. Thomas N. Bhagdikar D. Durst Z. Myers N. Tsiskaridze S. Richardson R. Bahr K. Fatahalian P. Hanrahan C. Barrett M. Horowitz C. Torng F. Kjolstad and P. Raina. 2023. AHA: An Agile Approach to the Design of Coarse-Grained Reconfigurable Accelerators and Compilers. ACM Transactions on Embedded Computing Systems 22 2 (2023). 10.1145\/3534933","DOI":"10.1145\/3534933"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Kostas Papagiannopoulos Ognjen Glamo\u010danin Melissa Azouaoui Dorian Ros Francesco Regazzoni and Mirjana Stojilovic. 2023. The Side-Channel Metrics Cheat Sheet. Comput. Surveys 55 10 (2023) 1\u201338. https:\/\/infoscience.epfl.ch\/record\/300078","DOI":"10.1145\/3565571"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3649153.3649213"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71713-5"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9839849"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","unstructured":"Falk Schellenberg Dennis R.\u00a0E. Gnad Amir Moradi and Mehdi\u00a0B. Tahoori. 2021. An Inside Job: Remote Power Analysis Attacks on FPGAs. IEEE Des. Test 38 3 (2021) 58\u201366. 10.1109\/MDAT.2021.3063306","DOI":"10.1109\/MDAT.2021.3063306"},{"key":"e_1_3_3_1_51_2","volume-title":"Digital Design with Chisel","author":"Schoeberl Martin","year":"2019","unstructured":"Martin Schoeberl. 2019. Digital Design with Chisel. Kindle Direct Publishing. https:\/\/github.com\/schoeberl\/chisel-book"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","unstructured":"Ghavam\u00a0G. Shahidi. 2019. Chip Power Scaling in Recent CMOS Technology Nodes. IEEE Access 7 (2019) 851\u2013856. 10.1109\/ACCESS.2018.2885895","DOI":"10.1109\/ACCESS.2018.2885895"},{"key":"e_1_3_3_1_53_2","volume-title":"Characterization and Modeling of Digital Circuits: Second Edition","author":"Sharma Rohit","year":"2018","unstructured":"Rohit Sharma. 2018. Characterization and Modeling of Digital Circuits: Second Edition. Independently Published. https:\/\/mitpressbookstore.mit.edu\/book\/9781983144820"},{"key":"e_1_3_3_1_54_2","unstructured":"Madura\u00a0A. Shelton Niels Samwel Lejla Batina Francesco Regazzoni Markus Wagner and Yuval Yarom. 2019. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. CoRR abs\/1912.05183 (2019). arXiv:https:\/\/arXiv.org\/abs\/1912.05183http:\/\/arxiv.org\/abs\/1912.05183"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605769.3623993"},{"key":"e_1_3_3_1_56_2","unstructured":"Microsoft\u00a0Azure Team. 2022. Accelerating Industry-Wide Innovations in Datacenter Infrastructure and Security. https:\/\/azure.microsoft.com\/en-us\/blog\/accelerating-industry-wide-innovations-in-datacenter-infrastructure-and-security\/ Accessed: 2025-01-12."},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2008.4479751"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2008.4479698"},{"key":"e_1_3_3_1_59_2","unstructured":"Clifford Wolf. 2025. PicoRV32: A Size-Optimized RISC-V CPU. https:\/\/github.com\/YosysHQ\/picorv32. Accessed: 2025-01-20."},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST.2018.8430152"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","unstructured":"Jannik Zeitschner Nicolai M\u00fcller and Amir Moradi. 2023. PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023 3 (2023) 391\u2013421. 10.46586\/TCHES.V2023.I3.391-421","DOI":"10.46586\/TCHES.V2023.I3.391-421"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:33:51Z","timestamp":1755070431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":60,"alternative-id":["10.1145\/3708821.3736216","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736216","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}