{"id":"https://openalex.org/W2959421486","doi":"https://doi.org/10.1109/ijcnn.2019.8852124","title":"Application Inference using Machine Learning based Side Channel Analysis","display_name":"Application Inference using Machine Learning based Side Channel Analysis","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2959421486","doi":"https://doi.org/10.1109/ijcnn.2019.8852124","mag":"2959421486"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2019.8852124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1907.04428","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076844961","display_name":"Nikhil Chawla","orcid":"https://orcid.org/0000-0003-3454-6135"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nikhil Chawla","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079752672","display_name":"Arvind Singh","orcid":"https://orcid.org/0000-0001-5238-7196"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arvind Singh","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061466560","display_name":"Monodeep Kar","orcid":"https://orcid.org/0000-0002-9318-6793"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Monodeep Kar","raw_affiliation_strings":["Intel Corporation, Hillsboro, OR, USA","Intel Corporation, Hillsboro, OR USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"Intel Corporation, Hillsboro, OR USA#TAB#","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009591041","display_name":"Saibal Mukhopadhyay","orcid":"https://orcid.org/0000-0002-8894-3390"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saibal Mukhopadhyay","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076844961"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.07281962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7301042079925537},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5543267726898193},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5002291202545166},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4985337257385254},{"id":"https://openalex.org/keywords/frequency-scaling","display_name":"Frequency scaling","score":0.4907873570919037},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.47399985790252686},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.4735676050186157},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.47349485754966736},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42542222142219543},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41190606355667114},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38626033067703247},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.3852928876876831},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3253093361854553},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2840697169303894},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21067222952842712},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19493845105171204},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1616601049900055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7301042079925537},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5543267726898193},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5002291202545166},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4985337257385254},{"id":"https://openalex.org/C157742956","wikidata":"https://www.wikidata.org/wiki/Q3237776","display_name":"Frequency scaling","level":3,"score":0.4907873570919037},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.47399985790252686},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.4735676050186157},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.47349485754966736},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42542222142219543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41190606355667114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38626033067703247},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.3852928876876831},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3253093361854553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2840697169303894},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21067222952842712},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19493845105171204},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1616601049900055},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/ijcnn.2019.8852124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1907.04428","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1907.04428","pdf_url":"https://arxiv.org/pdf/1907.04428","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2959421486","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1907.04428.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1907.04428","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1907.04428","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1907.04428","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1907.04428","pdf_url":"https://arxiv.org/pdf/1907.04428","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2959421486.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1993482360","https://openalex.org/W2096490242","https://openalex.org/W2117552728","https://openalex.org/W2124631616","https://openalex.org/W2144219822","https://openalex.org/W2157568256","https://openalex.org/W2163643194","https://openalex.org/W2166844173","https://openalex.org/W2293927790","https://openalex.org/W2319159802","https://openalex.org/W2611887307","https://openalex.org/W2625110865","https://openalex.org/W2734509410","https://openalex.org/W2750990141","https://openalex.org/W2751592946","https://openalex.org/W2798745612","https://openalex.org/W2805398154","https://openalex.org/W2900861686","https://openalex.org/W2914572864","https://openalex.org/W3100675173","https://openalex.org/W6610466836","https://openalex.org/W6678601690","https://openalex.org/W6682867983","https://openalex.org/W6683921424","https://openalex.org/W6743496458","https://openalex.org/W6756335094"],"related_works":["https://openalex.org/W2978001019","https://openalex.org/W3137701458","https://openalex.org/W3197235756","https://openalex.org/W2951941661","https://openalex.org/W3184548748","https://openalex.org/W3083229240","https://openalex.org/W2888062646","https://openalex.org/W187629273","https://openalex.org/W3047128389","https://openalex.org/W314894859","https://openalex.org/W2185219386","https://openalex.org/W1996026525","https://openalex.org/W2983440318","https://openalex.org/W2022059867","https://openalex.org/W2329282585","https://openalex.org/W3176992645","https://openalex.org/W3044969047","https://openalex.org/W3033311119","https://openalex.org/W2477057840","https://openalex.org/W346118108"],"abstract_inverted_index":{"The":[0,159],"proliferation":[1],"of":[2,12,27,114,176,209],"ubiquitous":[3],"computing":[4,32],"requires":[5],"energy-efficient":[6],"as":[7,9,41,52],"well":[8],"secure":[10],"operation":[11],"modern":[13,31],"processors.":[14],"Side":[15],"channel":[16],"attacks":[17,202],"are":[18],"becoming":[19],"a":[20,53,81,125,150,196],"critical":[21],"threat":[22],"to":[23,148,194,199],"security":[24,55],"and":[25,47,101,153,182],"privacy":[26],"devices":[28],"embedded":[29],"in":[30,73,119,169,179,186],"infrastructures.":[33],"Unintended":[34],"information":[35,60],"leakage":[36],"via":[37],"physical":[38],"signatures":[39],"such":[40],"power":[42],"consumption,":[43],"electromagnetic":[44],"emission":[45],"(EM)":[46],"execution":[48],"time":[49],"have":[50],"emerged":[51],"key":[54],"consideration":[56],"for":[57,86],"SoCs.":[58],"Also,":[59],"published":[61],"on":[62,90,94,124,162,166],"purpose":[63],"at":[64],"user":[65],"privilege":[66],"level":[67],"accessible":[68],"through":[69,203],"software":[70,102],"interfaces":[71],"results":[72,161],"software-only":[74],"attacks.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"used":[80],"supervised":[82],"learning":[83,116,135,204],"based":[84,93,117],"approach":[85,118],"inferring":[87],"applications":[88,164],"executing":[89],"android":[91],"platform":[92],"features":[95,123],"extracted":[96],"from":[97,141],"EM":[98],"side-channel":[99],"emissions":[100],"exposed":[103],"dynamic":[104],"voltage":[105],"frequency":[106,138,143,206],"scaling":[107],"(DVFS)":[108],"states.":[109],"We":[110,131],"highlight":[111,192],"the":[112,136,191],"importance":[113],"machine":[115],"utilizing":[120],"these":[121,177],"multi-dimensional":[122],"complex":[126],"SoC,":[127],"against":[128],"profiling-based":[129],"approaches.":[130],"also":[132],"show":[133],"that":[134],"instantaneous":[137,205],"states":[139,207],"polled":[140],"on-board":[142],"driver":[144],"(cpufreq)":[145],"is":[146,193],"adequate":[147],"identify":[149],"known":[151],"application":[152,200],"flag":[154],"potentially":[155],"malicious":[156],"unknown":[157,188],"application.":[158],"experimental":[160],"benchmarking":[163],"running":[165],"ARMv8":[167],"processor":[168],"Snapdragon":[170],"820":[171],"board":[172],"demonstrates":[173],"early":[174],"detection":[175],"apps":[178],"700":[180],"ms,":[181],"atleast":[183],"85%":[184],"accuracy":[185],"detecting":[187],"applications.":[189],"Overall,":[190],"utilize":[195],"low-complexity":[197],"path":[198],"inference":[201],"pattern":[208],"CPU":[210],"core.":[211]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
