{"id":"https://openalex.org/W3163417590","doi":"https://doi.org/10.1109/isqed51717.2021.9424254","title":"Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning","display_name":"Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3163417590","doi":"https://doi.org/10.1109/isqed51717.2021.9424254","mag":"3163417590"},"language":"en","primary_location":{"id":"doi:10.1109/isqed51717.2021.9424254","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424254","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029771473","display_name":"Dhruv Thapar","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dhruv Thapar","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053280523","display_name":"Manaar Alam","orcid":"https://orcid.org/0000-0002-3338-2944"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manaar Alam","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029771473"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":1.3597,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84267344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"185"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8069422245025635},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6581933498382568},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5907189846038818},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.569717288017273},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5437624454498291},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.5334494113922119},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5307369828224182},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5017962455749512},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4234352111816406},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41846364736557007},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36832451820373535},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16822746396064758},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15575116872787476},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08949741721153259}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069422245025635},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6581933498382568},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5907189846038818},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.569717288017273},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5437624454498291},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.5334494113922119},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5307369828224182},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5017962455749512},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4234352111816406},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41846364736557007},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36832451820373535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16822746396064758},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15575116872787476},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08949741721153259}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed51717.2021.9424254","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424254","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1752847028","https://openalex.org/W1796231437","https://openalex.org/W2556867355","https://openalex.org/W2746796098","https://openalex.org/W2887280559","https://openalex.org/W2903143476","https://openalex.org/W2914572864","https://openalex.org/W2923594358","https://openalex.org/W2945476062","https://openalex.org/W2952010918","https://openalex.org/W2952249730","https://openalex.org/W2954035222","https://openalex.org/W2996022685","https://openalex.org/W3008439737","https://openalex.org/W3046682795","https://openalex.org/W4245524709","https://openalex.org/W4251361495","https://openalex.org/W6771898502"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W4242235492","https://openalex.org/W2136687465","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W3016859066","https://openalex.org/W2385701518","https://openalex.org/W5280335"],"abstract_inverted_index":{"Side-channel":[0],"analysis":[1],"(SCA)":[2],"utilizing":[3],"the":[4,22,61,66,71,75,84,100,121,148,151,164,180,185,205,218,225,241],"power":[5,193,238],"consumption":[6],"of":[7,25,88,96,136,150,166,220],"a":[8,43,52,90,93,113,133,137,160,214,230],"device":[9,54,56,102,162,216,222,227,243],"has":[10,36],"proved":[11],"to":[12,60,69,119,183,196,212,229,245],"be":[13],"an":[14,40,129],"efficient":[15,80],"technique":[16],"for":[17,79],"recovering":[18],"secret":[19,72],"keys":[20],"exploiting":[21],"implementation":[23],"vulnerability":[24],"mathematically":[26],"secure":[27],"cryptographic":[28],"algorithms.":[29],"Recently,":[30],"Deep":[31],"Learning-based":[32],"profiled":[33,48,97,141,157],"SCA":[34],"(DL-SCA)":[35],"gained":[37],"popularity,":[38],"where":[39],"adversary":[41,130],"trains":[42],"deep":[44],"learning":[45,168,207],"model":[46,68,91,139,153,182],"using":[47,140,154],"traces":[49,98,142,158,194,239],"obtained":[50],"from":[51,74,83,99,143,159,175,217,240],"dummy":[53,101,161,242],"(a":[55],"that":[57,117,204],"is":[58],"similar":[59],"target":[62,76,85,186],"device)":[63],"and":[64,103,177],"uses":[65,179],"trained":[67],"retrieve":[70],"key":[73,81],"device.":[77,187],"However,":[78],"recovery":[82],"device,":[86,145],"training":[87,105,135,174],"such":[89],"requires":[92,235],"large":[94],"number":[95],"extensive":[104],"time.":[106],"In":[107],"this":[108],"paper,":[109],"we":[110],"propose":[111],"TranSCA,":[112],"new":[114,215,226],"DL-SCA":[115,248],"strategy":[116,169,208],"tries":[118],"address":[120],"issue.":[122],"TranSCA":[123,190,234],"works":[124],"in":[125,170],"three":[126],"steps":[127],"-":[128],"(1)":[131],"performs":[132],"one-time":[134],"base":[138,152],"any":[144,250],"(2)":[146],"fine-tunes":[147],"parameters":[149],"significantly":[155],"less":[156],"with":[163],"aid":[165],"transfer":[167,206],"lesser":[171],"time":[172],"than":[173],"scratch,":[176],"(3)":[178],"fine-tuned":[181],"attack":[184,213],"We":[188],"validate":[189],"on":[191],"simulated":[192],"created":[195],"represent":[197],"different":[198,231],"FPGA":[199],"families.":[200],"Experimental":[201],"results":[202],"show":[203],"makes":[209],"it":[210],"possible":[211],"knowledge":[219],"another":[221],"even":[223],"if":[224],"belongs":[228],"family.":[232],"Also,":[233],"very":[236],"few":[237],"compared":[244],"when":[246],"applying":[247],"without":[249],"previous":[251],"knowledge.":[252]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
