{"id":"https://openalex.org/W4389166685","doi":"https://doi.org/10.1109/iccad57390.2023.10323687","title":"SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?","display_name":"SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389166685","doi":"https://doi.org/10.1109/iccad57390.2023.10323687"},"language":"en","primary_location":{"id":"doi:10.1109/iccad57390.2023.10323687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102983951","display_name":"Andrija Ne\u0161kovi\u0107","orcid":"https://orcid.org/0009-0000-5031-2430"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Andrija Ne\u0161kovi\u0107","raw_affiliation_strings":["Institute of Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024325751","display_name":"Saleh Mulhem","orcid":"https://orcid.org/0000-0001-7380-5270"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Saleh Mulhem","raw_affiliation_strings":["Institute of Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057744895","display_name":"Alexander Treff","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexander Treff","raw_affiliation_strings":["Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany"],"affiliations":[{"raw_affiliation_string":"Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070129711","display_name":"Rainer Buchty","orcid":"https://orcid.org/0009-0004-9413-2078"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rainer Buchty","raw_affiliation_strings":["Institute of Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany"],"affiliations":[{"raw_affiliation_string":"Institute for IT Security University of L&#x00FC;beck,L&#x00FC;beck,Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039777488","display_name":"Mladen Berekovi\u0107","orcid":"https://orcid.org/0000-0003-1911-756X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mladen Berekovic","raw_affiliation_strings":["Institute of Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102983951"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8728,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79462054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/systemc","display_name":"SystemC","score":0.9499187469482422},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.8773106932640076},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7701820135116577},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7144138813018799},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4833095073699951},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.45417118072509766},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.453466534614563},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.44477319717407227},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4399682283401489},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42820632457733154},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.41798797249794006},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3693459630012512},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36338937282562256},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2552174925804138},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.20799756050109863},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10743957757949829}],"concepts":[{"id":"https://openalex.org/C2776928060","wikidata":"https://www.wikidata.org/wiki/Q1753563","display_name":"SystemC","level":2,"score":0.9499187469482422},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.8773106932640076},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7701820135116577},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7144138813018799},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4833095073699951},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.45417118072509766},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.453466534614563},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.44477319717407227},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4399682283401489},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42820632457733154},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.41798797249794006},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3693459630012512},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36338937282562256},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2552174925804138},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.20799756050109863},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10743957757949829},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad57390.2023.10323687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W67485690","https://openalex.org/W1562542037","https://openalex.org/W1669302834","https://openalex.org/W1752847028","https://openalex.org/W1829224650","https://openalex.org/W2017369466","https://openalex.org/W2050805876","https://openalex.org/W2091750459","https://openalex.org/W2111413831","https://openalex.org/W2112117539","https://openalex.org/W2259595829","https://openalex.org/W2471360464","https://openalex.org/W2487412196","https://openalex.org/W2513454130","https://openalex.org/W2599823679","https://openalex.org/W2613613421","https://openalex.org/W2727289891","https://openalex.org/W2909562835","https://openalex.org/W2914572864","https://openalex.org/W2914630606","https://openalex.org/W2967098993","https://openalex.org/W3040583432","https://openalex.org/W3045729505","https://openalex.org/W3120524050","https://openalex.org/W3139156009","https://openalex.org/W3152327067","https://openalex.org/W3194981216","https://openalex.org/W3214131340","https://openalex.org/W4213203382","https://openalex.org/W4250051479","https://openalex.org/W4293769214","https://openalex.org/W6766787143","https://openalex.org/W6770565366"],"related_works":["https://openalex.org/W2170314243","https://openalex.org/W2119179026","https://openalex.org/W2794947590","https://openalex.org/W2114971758","https://openalex.org/W1506159315","https://openalex.org/W2012037356","https://openalex.org/W4388214509","https://openalex.org/W2297417762","https://openalex.org/W1530804449","https://openalex.org/W2768334046"],"abstract_inverted_index":{"As":[0],"training":[1],"artificial":[2],"intelligence":[3],"(AI)":[4],"models":[5,144],"is":[6,20,181,198],"a":[7,16,86,102,185,199],"lengthy":[8],"and":[9,56,109,133,157],"hence":[10,197],"costly":[11],"process,":[12],"leakage":[13,31,74],"of":[14,26,37,42,80,165,191,210],"such":[15],"model's":[17],"internal":[18,40],"parameters":[19],"highly":[21],"undesirable.":[22],"In":[23,67],"the":[24,34,39,60,76,94,163,192,208],"case":[25],"AI":[27,81,212],"accelerators,":[28],"side-channel":[29,122],"information":[30,73,140],"opens":[32],"up":[33],"threat":[35,95,116,176],"scenario":[36,96],"extracting":[38],"secrets":[41],"pre-trained":[43],"models.":[44],"Therefore,":[45],"sufficiently":[46],"elaborate":[47],"methods":[48,124],"for":[49,105,174],"design":[50,78,107,209],"verification":[51],"as":[52,54,101],"well":[53],"fault":[55],"security":[57],"evaluation":[58,108],"at":[59],"electronic":[61],"system":[62],"level":[63],"are":[64,145],"in":[65,85,168],"demand.":[66],"this":[68,111],"paper,":[69],"we":[70,161],"propose":[71],"estimating":[72],"from":[75],"early":[77,106,175],"steps":[79],"accelerators":[82],"to":[83,115,138,153,171],"aid":[84],"more":[87],"robust":[88],"architectural":[89],"design.":[90],"We":[91,118],"first":[92],"introduce":[93],"before":[97],"diving":[98],"into":[99],"SystemC":[100],"standard":[103],"method":[104],"how":[110],"can":[112],"be":[113],"applied":[114],"modeling.":[117],"present":[119],"two":[120],"successful":[121],"attack":[123,204],"executed":[125],"via":[126,184],"SystemC-based":[127],"power":[128,131,151],"modeling:":[129],"correlation":[130],"analysis":[132],"template":[134],"attack,":[135],"both":[136],"leading":[137],"total":[139],"leakage.":[141],"The":[142,178],"presented":[143,179],"verified":[146],"against":[147],"an":[148],"industry-standard":[149],"netlist-level":[150],"estimation":[152],"prove":[154],"general":[155],"feasibility":[156],"determine":[158],"accuracy.":[159],"Consequently,":[160],"explore":[162],"impact":[164],"additive":[166],"noise":[167],"our":[169],"simulation":[170],"establish":[172],"indicators":[173],"evaluation.":[177],"approach":[180],"again":[182],"validated":[183],"model-vs-netlist":[186],"comparison,":[187],"showing":[188],"high":[189],"accuracy":[190],"achieved":[193],"results.":[194],"This":[195],"work":[196],"solid":[200],"step":[201],"towards":[202],"fast":[203],"deployment":[205],"and,":[206],"subsequently,":[207],"attack-resilient":[211],"accelerators.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-12-01T00:00:00"}
