{"id":"https://openalex.org/W4232592560","doi":"https://doi.org/10.1109/iccad.2017.8203769","title":"Efficient simulation of EM side-channel attack resilience","display_name":"Efficient simulation of EM side-channel attack resilience","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W4232592560","doi":"https://doi.org/10.1109/iccad.2017.8203769"},"language":"en","primary_location":{"id":"doi:10.1109/iccad.2017.8203769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2017.8203769","pdf_url":null,"source":{"id":"https://openalex.org/S4363608376","display_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100727521","display_name":"Amit Kumar","orcid":"https://orcid.org/0009-0004-8545-2176"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amit Kumar","raw_affiliation_strings":["Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067361305","display_name":"Cody Scarborough","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cody Scarborough","raw_affiliation_strings":["Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072461338","display_name":"Ali E. Y\u0131lmaz","orcid":"https://orcid.org/0000-0003-2573-1515"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ali Yilmaz","raw_affiliation_strings":["Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090899796","display_name":"Michael Orshansky","orcid":"https://orcid.org/0000-0002-6223-4748"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Orshansky","raw_affiliation_strings":["Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100727521"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":1.80024209,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.87615426,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"123","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8604461550712585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7404880523681641},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6769745349884033},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6234641671180725},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5591195821762085},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5415345430374146},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4508334696292877},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.4429125189781189},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4359540641307831},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4341164231300354},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4211609661579132},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.392797589302063},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3541937470436096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3508254885673523},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32387775182724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2546646296977997}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8604461550712585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7404880523681641},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6769745349884033},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6234641671180725},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5591195821762085},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5415345430374146},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4508334696292877},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.4429125189781189},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4359540641307831},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4341164231300354},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4211609661579132},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.392797589302063},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3541937470436096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3508254885673523},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32387775182724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2546646296977997},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad.2017.8203769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2017.8203769","pdf_url":null,"source":{"id":"https://openalex.org/S4363608376","display_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310620","display_name":"University of Texas at Austin","ror":"https://ror.org/00hj54h04"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1511843316","https://openalex.org/W1552623947","https://openalex.org/W1562542037","https://openalex.org/W1613874182","https://openalex.org/W1703634901","https://openalex.org/W1945373036","https://openalex.org/W1997654539","https://openalex.org/W2017165380","https://openalex.org/W2022215042","https://openalex.org/W2053666879","https://openalex.org/W2108742901","https://openalex.org/W2133707980","https://openalex.org/W2144765857","https://openalex.org/W2154909745","https://openalex.org/W2156332776","https://openalex.org/W2157397025","https://openalex.org/W2163432699","https://openalex.org/W2174170220","https://openalex.org/W2404401031","https://openalex.org/W2533043266","https://openalex.org/W4238341678","https://openalex.org/W6685306663"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W2029006445","https://openalex.org/W4255075415","https://openalex.org/W2059218952"],"abstract_inverted_index":{"Electromagnetic":[0],"(EM)":[1],"fields":[2],"emanated":[3],"during":[4],"crypto-operations":[5],"are":[6,29],"an":[7,186],"effective":[8],"non-invasive":[9],"channel":[10],"for":[11,48,72],"extracting":[12],"secret":[13],"keys.":[14],"To":[15],"predict":[16],"vulnerabilities":[17],"and":[18,45,58,61,85,115,158],"improve":[19],"resilience":[20],"to":[21,81,90,136,155,174],"EM":[22,46,65,73,88,146],"side-channel":[23,74],"analysis":[24,76],"attacks,":[25],"design-time":[26],"simulation":[27,32,47,101],"tools":[28,80],"needed.":[30],"Predictive":[31],"of":[33,52,64,126,130,169],"such":[34],"attacks":[35,138,147,157],"is":[36],"computationally":[37],"taxing,":[38],"however,":[39],"as":[40],"it":[41],"requires":[42],"transient":[43],"circuit":[44],"a":[49,69,86,95,123,127,176,181],"large":[50],"number":[51],"encryptions,":[53],"with":[54,139,150,180],"high":[55,59],"modeling":[56],"accuracy,":[57],"spatial":[60],"temporal":[62],"resolution":[63],"fields.":[66],"We":[67,93,143],"developed":[68],"computational":[70],"platform":[71,165],"attack":[75],"using":[77],"commercial":[78],"EDA":[79],"extract":[82],"current":[83],"waveforms":[84],"custom":[87],"simulator":[89],"radiate":[91],"them.":[92],"achieve":[94],"7000X":[96],"speed-up":[97],"over":[98,185],"brute-force":[99],"sequential":[100],"by":[102],"identifying":[103],"information-leaking":[104,161],"cycles,":[105],"deploying":[106],"hybrid":[107],"gate-and":[108],"transistor-level":[109],"simulation,":[110],"radiating":[111],"only":[112],"EM-dominant":[113],"currents,":[114],"simulating":[116],"different":[117],"encryptions":[118,153],"in":[119],"parallel.":[120],"This":[121],"permits":[122],"vulnerability":[124],"study":[125],"32nm":[128],"design":[129,179],"Advanced":[131],"Encryption":[132],"System":[133],"block":[134],"cipher":[135],"differential":[137],"manageable":[140],"20h/attack":[141],"cost.":[142],"demonstrate":[144],"that":[145],"can":[148],"succeed":[149],"6X":[151],"fewer":[152],"compared":[154],"power":[156],"identify":[159,175],"worst":[160],"hotspots.":[162],"The":[163],"proposed":[164],"enables":[166],"targeted":[167],"deployment":[168],"design-level":[170],"countermeasures,":[171],"leading":[172],"us":[173],"power/ground":[177],"network":[178],"4X":[182],"security":[183],"boost":[184],"alternative.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
