{"id":"https://openalex.org/W2142530212","doi":"https://doi.org/10.1145/1086228.1086268","title":"Power consumption profile analysis for security attack simulation in smart cards at high abstraction level","display_name":"Power consumption profile analysis for security attack simulation in smart cards at high abstraction level","publication_year":2005,"publication_date":"2005-09-18","ids":{"openalex":"https://openalex.org/W2142530212","doi":"https://doi.org/10.1145/1086228.1086268","mag":"2142530212"},"language":"en","primary_location":{"id":"doi:10.1145/1086228.1086268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086228.1086268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM international conference on Embedded software","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036451595","display_name":"Klaus Rothbart","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"K. Rothbart","raw_affiliation_strings":["Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015550940","display_name":"Ulrich Neffe","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"U. Neffe","raw_affiliation_strings":["Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048811541","display_name":"Christian Steger","orcid":"https://orcid.org/0000-0002-4441-266X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Ch. Steger","raw_affiliation_strings":["Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053553255","display_name":"R. Wei\u00df","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"R. Weiss","raw_affiliation_strings":["Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005724058","display_name":"Edgar Rieger","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E. Rieger","raw_affiliation_strings":["Philips Austria GmbH. Styria, Gratkorn, Austria","Philips Austria GmbH. Styria, Gratkorn, Austria#TAB#"],"affiliations":[{"raw_affiliation_string":"Philips Austria GmbH. Styria, Gratkorn, Austria","institution_ids":[]},{"raw_affiliation_string":"Philips Austria GmbH. Styria, Gratkorn, Austria#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029153311","display_name":"A. Muehlberger","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Muehlberger","raw_affiliation_strings":["Philips Austria GmbH. Styria, Gratkorn, Austria","Philips Austria GmbH. Styria, Gratkorn, Austria#TAB#"],"affiliations":[{"raw_affiliation_string":"Philips Austria GmbH. Styria, Gratkorn, Austria","institution_ids":[]},{"raw_affiliation_string":"Philips Austria GmbH. Styria, Gratkorn, Austria#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5036451595"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":2.7425,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91374808,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"214","last_page":"217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8008526563644409},{"id":"https://openalex.org/keywords/systemc","display_name":"SystemC","score":0.6737399101257324},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.6593805551528931},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5761654376983643},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5263931751251221},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.5261832475662231},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5213695168495178},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5049260258674622},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.46803998947143555},{"id":"https://openalex.org/keywords/transaction-level-modeling","display_name":"Transaction-level modeling","score":0.4383479654788971},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.42934292554855347},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4230394661426544},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3264291286468506},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15491706132888794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8008526563644409},{"id":"https://openalex.org/C2776928060","wikidata":"https://www.wikidata.org/wiki/Q1753563","display_name":"SystemC","level":2,"score":0.6737399101257324},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.6593805551528931},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5761654376983643},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5263931751251221},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.5261832475662231},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5213695168495178},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5049260258674622},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.46803998947143555},{"id":"https://openalex.org/C169571997","wikidata":"https://www.wikidata.org/wiki/Q966099","display_name":"Transaction-level modeling","level":3,"score":0.4383479654788971},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.42934292554855347},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4230394661426544},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3264291286468506},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15491706132888794},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1086228.1086268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086228.1086268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM international conference on Embedded software","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.456.7060","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.7060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.york.ac.uk/rts/docs/EMSOFT-2004-2005/docs05/p214.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1597805936","https://openalex.org/W1837001584","https://openalex.org/W2016562955","https://openalex.org/W2166112853","https://openalex.org/W2166512883","https://openalex.org/W3151416351","https://openalex.org/W3152181250","https://openalex.org/W6635673271","https://openalex.org/W6638789758"],"related_works":["https://openalex.org/W2533881872","https://openalex.org/W2301151507","https://openalex.org/W1596567466","https://openalex.org/W2585026057","https://openalex.org/W2379408401","https://openalex.org/W2359630088","https://openalex.org/W1996778651","https://openalex.org/W3151664512","https://openalex.org/W1603163876","https://openalex.org/W2133642747"],"abstract_inverted_index":{"Smart":[0],"cards":[1,31,43],"are":[2,6,27,44],"embedded":[3],"systems":[4],"which":[5],"used":[7,128],"in":[8,64,95,104],"an":[9],"increasing":[10],"number":[11],"of":[12,54,132],"secure":[13],"applications.":[14],"As":[15],"they":[16],"store":[17],"and":[18,22],"deal":[19],"with":[20],"confidential":[21],"secret":[23],"data":[24],"many":[25],"attacks":[26,91],"performed":[28,60],"on":[29,41],"these":[30],"to":[32,50,129,135,140],"reveal":[33],"this":[34,58,114,120],"private":[35],"information.":[36],"Consequently,":[37],"the":[38,52,55,65,70,96,107,133],"security":[39,53,81,90,136],"demands":[40],"smart":[42,86],"very":[45,62],"high.":[46],"It":[47],"is":[48,59,111],"mandatory":[49],"evaluate":[51],"design":[56,66],"but":[57],"often":[61],"late":[63],"process":[67],"or":[68],"when":[69],"chip":[71],"has":[72],"already":[73],"been":[74],"manufactured.":[75],"This":[76],"paper":[77],"presents":[78],"a":[79],"hierarchical":[80],"attack":[82],"simulation":[83],"flow":[84],"for":[85],"card":[87],"designs":[88],"where":[89],"can":[92,126,144],"be":[93,127,146],"simulated":[94],"processor":[97],"specific":[98],"model":[99],"at":[100,113,122],"transaction":[101],"layer":[102],"1":[103],"SystemC.":[105],"Therefore,":[106],"power":[108],"consumption":[109],"profile":[110],"analyzed":[112],"level.":[115],"Preliminary":[116],"results":[117],"show":[118],"that":[119],"analysis":[121],"high":[123],"abstraction":[124],"level":[125],"determine":[130],"vulnerabilities":[131],"system":[134],"attacks.":[137],"Moreover,":[138],"points":[139],"insert":[141],"software":[142],"countermeasures":[143],"easily":[145],"identified.":[147]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
