{"id":"https://openalex.org/W3206225879","doi":"https://doi.org/10.1109/tifs.2022.3176189","title":"Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment","display_name":"Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W3206225879","doi":"https://doi.org/10.1109/tifs.2022.3176189","mag":"3206225879"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3176189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3176189","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09777693.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09777693.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044494284","display_name":"Unai Rioja","orcid":"https://orcid.org/0000-0003-0892-3611"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Unai Rioja","raw_affiliation_strings":["Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, Nijmegen, EC, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, Nijmegen, EC, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051408740","display_name":"Lejla Batina","orcid":"https://orcid.org/0000-0003-0727-3573"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lejla Batina","raw_affiliation_strings":["Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, Nijmegen, EC, The Netherlands","Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, 6525 EC Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, Nijmegen, EC, The Netherlands","institution_ids":["https://openalex.org/I145872427"]},{"raw_affiliation_string":"Digital Security Group, Institute for Computing and Information Sciences (ICIS), Radboud University, 6525 EC Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042317700","display_name":"Igor Armendariz","orcid":"https://orcid.org/0000-0002-5055-455X"},"institutions":[{"id":"https://openalex.org/I4210121514","display_name":"GAIKER Technology Centre","ror":"https://ror.org/02pwsw017","country_code":"ES","type":"facility","lineage":["https://openalex.org/I4210121514"]},{"id":"https://openalex.org/I4210140267","display_name":"Ikerlan","ror":"https://ror.org/03hp1m080","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210140267"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Igor Armendariz","raw_affiliation_strings":["Ikerlan Technological Research Centre, Basque Research and Technology Alliance (BRTA), Arrasate-Mondrag&#x00F3;n, Spain"],"affiliations":[{"raw_affiliation_string":"Ikerlan Technological Research Centre, Basque Research and Technology Alliance (BRTA), Arrasate-Mondrag&#x00F3;n, Spain","institution_ids":["https://openalex.org/I4210121514","https://openalex.org/I4210140267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035500193","display_name":"Jos\u00e9 Luis Flores","orcid":"https://orcid.org/0000-0002-5555-9712"},"institutions":[{"id":"https://openalex.org/I4210121514","display_name":"GAIKER Technology Centre","ror":"https://ror.org/02pwsw017","country_code":"ES","type":"facility","lineage":["https://openalex.org/I4210121514"]},{"id":"https://openalex.org/I4210140267","display_name":"Ikerlan","ror":"https://ror.org/03hp1m080","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210140267"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jose Luis Flores","raw_affiliation_strings":["Ikerlan Technological Research Centre, Basque Research and Technology Alliance (BRTA), Arrasate-Mondrag&#x00F3;n, Spain"],"affiliations":[{"raw_affiliation_string":"Ikerlan Technological Research Centre, Basque Research and Technology Alliance (BRTA), Arrasate-Mondrag&#x00F3;n, Spain","institution_ids":["https://openalex.org/I4210121514","https://openalex.org/I4210140267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044494284"],"corresponding_institution_ids":["https://openalex.org/I145872427"],"apc_list":null,"apc_paid":null,"fwci":0.9653,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78601055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"3906","last_page":"3921"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479548692703247},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7073220014572144},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5826473236083984},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4868868887424469},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4549599885940552},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.44173792004585266},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37001797556877136},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19626370072364807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16088885068893433}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479548692703247},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7073220014572144},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5826473236083984},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4868868887424469},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4549599885940552},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.44173792004585266},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37001797556877136},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19626370072364807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16088885068893433},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2022.3176189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3176189","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09777693.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/286003","is_oa":false,"landing_page_url":"https://repository.ubn.ru.nl/handle/2066/286003","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, 17, pp. 3906-3921","raw_type":"Article / Letter to editor"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/286003","is_oa":true,"landing_page_url":"http://hdl.handle.net/2066/286003","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, 17, 3906 - 3921","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2022.3176189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3176189","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09777693.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G1408055434","display_name":null,"funder_award_id":"EGIDA (CER-20191012)","funder_id":"https://openalex.org/F4320321043","funder_display_name":"Centro para el Desarrollo Tecnol\u00f3gico Industrial"},{"id":"https://openalex.org/G3673497853","display_name":null,"funder_award_id":"KK-2021/00091","funder_id":"https://openalex.org/F4320321705","funder_display_name":"Eusko Jaurlaritza"}],"funders":[{"id":"https://openalex.org/F4320321043","display_name":"Centro para el Desarrollo Tecnol\u00f3gico Industrial","ror":"https://ror.org/0124x7055"},{"id":"https://openalex.org/F4320321705","display_name":"Eusko Jaurlaritza","ror":"https://ror.org/00pz2fp31"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3206225879.pdf","grobid_xml":"https://content.openalex.org/works/W3206225879.grobid-xml"},"referenced_works_count":71,"referenced_works":["https://openalex.org/W262970172","https://openalex.org/W802019357","https://openalex.org/W1499081748","https://openalex.org/W1532071734","https://openalex.org/W1540404582","https://openalex.org/W1543721789","https://openalex.org/W1562542037","https://openalex.org/W1607006990","https://openalex.org/W1752847028","https://openalex.org/W1766541702","https://openalex.org/W1774054610","https://openalex.org/W1862426464","https://openalex.org/W1943109301","https://openalex.org/W1993482360","https://openalex.org/W2008071701","https://openalex.org/W2052570068","https://openalex.org/W2055556325","https://openalex.org/W2110667749","https://openalex.org/W2145267250","https://openalex.org/W2150051818","https://openalex.org/W2154909745","https://openalex.org/W2170782029","https://openalex.org/W2186078203","https://openalex.org/W2295728772","https://openalex.org/W2395943251","https://openalex.org/W2414365832","https://openalex.org/W2497309206","https://openalex.org/W2497693771","https://openalex.org/W2556867355","https://openalex.org/W2588081654","https://openalex.org/W2607239406","https://openalex.org/W2746796098","https://openalex.org/W2759450573","https://openalex.org/W2794921443","https://openalex.org/W2905948624","https://openalex.org/W2914530593","https://openalex.org/W2939963136","https://openalex.org/W2954019744","https://openalex.org/W2954035222","https://openalex.org/W2972518368","https://openalex.org/W2990296674","https://openalex.org/W2990306706","https://openalex.org/W2991385415","https://openalex.org/W2996022685","https://openalex.org/W2996111659","https://openalex.org/W3003996345","https://openalex.org/W3017365885","https://openalex.org/W3033414884","https://openalex.org/W3092029709","https://openalex.org/W3094555005","https://openalex.org/W3094704314","https://openalex.org/W3096110808","https://openalex.org/W3097484825","https://openalex.org/W3116073070","https://openalex.org/W3126247501","https://openalex.org/W3163488691","https://openalex.org/W3164261842","https://openalex.org/W4239750483","https://openalex.org/W4245524709","https://openalex.org/W4253111648","https://openalex.org/W4286850361","https://openalex.org/W4289115712","https://openalex.org/W4298870207","https://openalex.org/W4300347525","https://openalex.org/W6631596758","https://openalex.org/W6676695801","https://openalex.org/W6686917895","https://openalex.org/W6759483600","https://openalex.org/W6759495720","https://openalex.org/W6785343617","https://openalex.org/W6805025580"],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W2355833770","https://openalex.org/W1985458517","https://openalex.org/W3031039437","https://openalex.org/W183202219","https://openalex.org/W3095877357","https://openalex.org/W2072565696","https://openalex.org/W2050451745","https://openalex.org/W4389650576"],"abstract_inverted_index":{"Evaluating":[0],"the":[1,18,34,44,50,130,144,147,153],"side-channel":[2,79],"resistance":[3],"in":[4,111],"practice":[5],"is":[6],"a":[7,68,78,100,105,188],"problematic":[8],"and":[9,52,141,187],"arduous":[10],"process.":[11],"Current":[12],"certification":[13],"schemes":[14],"require":[15],"to":[16,28,49],"attack":[17],"device":[19],"under":[20],"test":[21],"with":[22,159,183],"an":[23,84,170],"ever-growing":[24],"number":[25],"of":[26,38,56,59,70,73,83,107,114,129,143,146,152,173],"techniques":[27,40],"validate":[29],"its":[30],"security.":[31],"In":[32],"addition,":[33],"success":[35],"or":[36],"failure":[37],"these":[39],"strongly":[41],"depends":[42],"on":[43,95,185],"individual":[45],"implementing":[46],"them":[47],"due":[48],"fallible":[51],"human":[53],"intrinsic":[54],"nature":[55],"several":[57,118],"steps":[58],"this":[60,64,112],"path.":[61],"To":[62,87],"alleviate":[63],"problem,":[65],"we":[66,91,116],"propose":[67,117],"battery":[69],"automated":[71],"(Estimation":[72],"Distribution":[74],"Algorihm(EDA)-based)":[75],"attacks":[76],"as":[77,104,125,169],"analysis":[80,142],"robustness":[81],"assessment":[82],"embedded":[85],"device.":[86],"prove":[88],"our":[89,108,181],"approach,":[90],"conduct":[92],"realistic":[93],"experiments":[94,184],"two":[96,135],"different":[97],"devices,":[98],"creating":[99],"new":[101],"dataset":[102,190],"(AES_RA)":[103],"part":[106],"contribution.":[109],"Furthermore,":[110],"context":[113],"automation,":[115],"novel":[119],"improvements":[120],"over":[121],"current":[122],"EDA-based":[123],"attacks,":[124],"follows:":[126],"1)":[127],"optimization":[128],"search":[131,154],"process":[132,155],"by":[133,156],"employing":[134],"proposed":[136],"initialization":[137],"techniques;":[138],"2)":[139],"improvement":[140],"generalization":[145],"obtained":[148],"templates;":[149],"3)":[150],"acceleration":[151],"combining":[157],"EDAs":[158],"Principal":[160],"Component":[161],"Analysis":[162],"(PCA).":[163],"The":[164],"last":[165],"contribution":[166],"also":[167],"serves":[168],"alternative":[171],"way":[172],"selecting":[174],"optimal":[175],"principal":[176],"components":[177],"automatically.":[178],"We":[179],"support":[180],"claims":[182],"AES_RA":[186],"public":[189],"(ASCAD),":[191],"showing":[192],"how":[193],"our,":[194],"although":[195],"fully":[196],"automated,":[197],"approach":[198],"can":[199],"straightforwardly":[200],"provide":[201],"state-of-the-art":[202],"results.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-10-25T00:00:00"}
