{"id":"https://openalex.org/W4402957960","doi":"https://doi.org/10.1145/3678890.3678900","title":"A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces","display_name":"A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402957960","doi":"https://doi.org/10.1145/3678890.3678900"},"language":"en","primary_location":{"id":"doi:10.1145/3678890.3678900","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678900","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3678890.3678900","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092350516","display_name":"Mabon Ninan","orcid":"https://orcid.org/0009-0000-3619-5848"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mabon Ninan","raw_affiliation_strings":["University of Cincinnati, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati, United States of America","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107629162","display_name":"Evan Nimmo","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Evan Nimmo","raw_affiliation_strings":["University of Cincinnati, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati, United States of America","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075866395","display_name":"Shane Reilly","orcid":"https://orcid.org/0000-0002-6816-8606"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shane Reilly","raw_affiliation_strings":["University of Cincinnati, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati, United States of America","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111345857","display_name":"C. D. Smith","orcid":null},"institutions":[{"id":"https://openalex.org/I204593131","display_name":"College of Charleston","ror":"https://ror.org/00390t168","country_code":"US","type":"education","lineage":["https://openalex.org/I204593131"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Channing Smith","raw_affiliation_strings":["College of Charleston, USA"],"affiliations":[{"raw_affiliation_string":"College of Charleston, USA","institution_ids":["https://openalex.org/I204593131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045191954","display_name":"Wenhai Sun","orcid":"https://orcid.org/0000-0003-0458-0092"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenhai Sun","raw_affiliation_strings":["Purdue University, United States of America"],"affiliations":[{"raw_affiliation_string":"Purdue University, United States of America","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725035","display_name":"Boyang Wang","orcid":"https://orcid.org/0000-0001-8973-2328"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Boyang Wang","raw_affiliation_strings":["University of Cincinnati, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati, United States of America","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031863054","display_name":"John M. Emmert","orcid":"https://orcid.org/0000-0002-6074-535X"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John M. Emmert","raw_affiliation_strings":["University of Cincinnati, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati, United States of America","institution_ids":["https://openalex.org/I63135867"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5092350516"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":null,"apc_paid":null,"fwci":1.0425,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.8116802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"630","last_page":"643"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.8864495754241943},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8740885257720947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7085791826248169},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4937487542629242},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32661116123199463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2984582185745239},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2659553289413452},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23569199442863464},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13158372044563293}],"concepts":[{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.8864495754241943},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8740885257720947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7085791826248169},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4937487542629242},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32661116123199463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2984582185745239},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2659553289413452},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23569199442863464},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13158372044563293}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678890.3678900","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678900","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3678890.3678900","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678890.3678900","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 27th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1132522702","display_name":null,"funder_award_id":"CNS-2225160","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1343603020","display_name":null,"funder_award_id":"CNS-2238680","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5225878257","display_name":null,"funder_award_id":"CNS-1916722","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7285469256","display_name":null,"funder_award_id":"CNS-2150086","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1607006990","https://openalex.org/W1731081199","https://openalex.org/W2005193355","https://openalex.org/W2177288330","https://openalex.org/W2810943746","https://openalex.org/W2954035222","https://openalex.org/W2990296674","https://openalex.org/W3008439737","https://openalex.org/W3088610887","https://openalex.org/W3126247501","https://openalex.org/W3154592730","https://openalex.org/W3202469603","https://openalex.org/W3203012334","https://openalex.org/W3204813235","https://openalex.org/W4213273398","https://openalex.org/W4220818465","https://openalex.org/W4236883145","https://openalex.org/W4241389749","https://openalex.org/W4251361495","https://openalex.org/W4285507093","https://openalex.org/W4303427124","https://openalex.org/W4323842901","https://openalex.org/W4378191238","https://openalex.org/W4382396155","https://openalex.org/W4389395060","https://openalex.org/W4392753829","https://openalex.org/W4393647701","https://openalex.org/W4399396314","https://openalex.org/W4399403583","https://openalex.org/W4399930929","https://openalex.org/W4399930930","https://openalex.org/W4403175065"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W107105315","https://openalex.org/W1584537303","https://openalex.org/W4388155270","https://openalex.org/W1872724644","https://openalex.org/W4367156293","https://openalex.org/W2750549761","https://openalex.org/W2211967836","https://openalex.org/W3008439737"],"abstract_inverted_index":{"Deep":[0],"learning":[1,51],"side-channel":[2,52],"attacks":[3,53],"can":[4,45],"recover":[5],"encryption":[6],"keys":[7],"on":[8],"a":[9],"target":[10],"by":[11],"analyzing":[12],"power":[13],"consumption":[14],"or":[15],"electromagnetic":[16],"(EM)":[17],"signals.":[18],"However,":[19],"they":[20],"are":[21,26,62],"less":[22],"portable":[23],"when":[24],"there":[25],"domain":[27,43,55],"shifts":[28,56],"between":[29],"training":[30],"and":[31,41],"test":[32],"data.":[33],"While":[34],"existing":[35],"studies":[36],"have":[37],"shown":[38],"that":[39],"pre-processing":[40],"unsupervised":[42],"adaptation":[44],"enhance":[46],"the":[47,60],"portability":[48],"of":[49],"deep":[50],"given":[54],"over":[57],"EM":[58],"traces,":[59],"findings":[61],"limited":[63],"to":[64],"easy":[65],"targets":[66],"(e.g.":[67],"8-bit":[68],"microcontrollers).":[69]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
