{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:22:19Z","timestamp":1760746939586,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1145\/3768725.3768730","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T11:54:33Z","timestamp":1760702073000},"page":"73-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Gem5 for Side-Channel Power Attack Simulation of Cryptographic Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1304-0891","authenticated-orcid":false,"given":"Christian","family":"Appold","sequence":"first","affiliation":[{"name":"Denso Automotive Deutschland GmbH, Eching, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1419-3693","authenticated-orcid":false,"given":"Yong","family":"Hu","sequence":"additional","affiliation":[{"name":"Cadence Design Systems GmbH, Feldkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8586-512X","authenticated-orcid":false,"given":"Ernesto Cristopher","family":"Villegas Castillo","sequence":"additional","affiliation":[{"name":"Cadence Design Systems GmbH, Feldkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9698-3436","authenticated-orcid":false,"given":"Hans-Martin","family":"Bluethgen","sequence":"additional","affiliation":[{"name":"Cadence Design Systems GmbH, Feldkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2068-6738","authenticated-orcid":false,"given":"Tim","family":"Leinm\u00fcller","sequence":"additional","affiliation":[{"name":"Denso Automotive Deutschland GmbH, Eching, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2008.8"},{"key":"e_1_3_3_1_3_2","volume-title":"OSCI TLM-2.0 language reference manual (ja32 ed.)","author":"Aynsley John","year":"2009","unstructured":"John Aynsley. 2009. OSCI TLM-2.0 language reference manual (ja32 ed.). Open SystemC Initiative."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1810085.1810108"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00036"},{"key":"e_1_3_3_1_6_2","unstructured":"Ileana Buhan Lejla Batina Yuval Yarom and Patrick Schaumont. 2021. SoK: Design Tools for Side-Channel-Aware Implementations. arxiv:https:\/\/arXiv.org\/abs\/2104.08593\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2104.08593"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.371964"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/fdl53530.2021.9568377"},{"key":"e_1_3_3_1_9_2","unstructured":"Gilbert Goodwill Benjamin Jun Joshua Jaffe and Pankaj Rohatgi. 2011. A testing methodology for side \u00ad channel resistance validation. https:\/\/api.semanticscholar.org\/CorpusID:16852899"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"e_1_3_3_1_11_2","unstructured":"Thomas\u00a0E. Hansen. [n. d.]. ARM Power Modelling-gem5. https:\/\/www.gem5.org\/documentation\/learning_gem5\/part2\/arm_power_modelling. Accessed: 2025-05-17."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2019.8758600"},{"key":"e_1_3_3_1_13_2","unstructured":"Mario Kirschbaum and Thomas Popp. 2007. Evaluation of power estimation methods based on logic simulations. (01 2007)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_3_1_16_2","unstructured":"Jason Lowe-Power et\u00a0al. 2020. The gem5 Simulator: Version 20.0+. CoRR abs\/2007.03152 (2020). arXiv:https:\/\/arXiv.org\/abs\/2007.03152https:\/\/arxiv.org\/abs\/2007.03152"},{"key":"e_1_3_3_1_17_2","unstructured":"David McCann Carolyn Whitnall and Elisabeth Oswald. 2016. ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. IACR Cryptol. ePrint Arch. 2016 (2016) 517."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAMOS.2017.8344612"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_14"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Adib Nahiyan Jungmin Park Miao He Yousef Iskander Farimah Farahmandi Domenic Forte and Mark Tehranipoor. 2020. SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation. ACM Trans. Des. Autom. Electron. Syst. 25 3 Article 26 (May 2020) 27\u00a0pages. 10.1145\/3383445","DOI":"10.1145\/3383445"},{"key":"e_1_3_3_1_21_2","unstructured":"National Institute of Standards and Technology. 1999. Data Encryption Standard (DES). FIPS Publication 46-3."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295285"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Eric Peeters Fran\u00e7ois-Xavier Standaert and Jean-Jacques Quisquater. 2007. Power and electromagnetic analysis: Improved model consequences and comparisons. Integration 40 1 (2007) 52\u201360. 10.1016\/j.vlsi.2005.12.013Embedded Cryptographic Hardware.","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/FDL50818.2020.9232947"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Mark Randolph and William Diehl. 2020. Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman. Cryptography 4 2 (2020). 10.3390\/cryptography4020015","DOI":"10.3390\/cryptography4020015"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2017.8106988"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"R.\u00a0L. Rivest et\u00a0al. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 2 (Feb. 1978) 120\u2013126. 10.1145\/359340.359342","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.119"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.59"}],"event":{"name":"HASP '25: Hardware and Architectural Support for Security and Privacy 2025","location":"Seoul Republic of Korea","acronym":"HASP 2025"},"container-title":["Proceedings of the 14th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3768725.3768730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T12:31:59Z","timestamp":1760704319000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3768725.3768730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,18]]},"references-count":28,"alternative-id":["10.1145\/3768725.3768730","10.1145\/3768725"],"URL":"https:\/\/doi.org\/10.1145\/3768725.3768730","relation":{},"subject":[],"published":{"date-parts":[[2025,10,18]]},"assertion":[{"value":"2025-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}