{"id":"https://openalex.org/W4405242250","doi":"https://doi.org/10.46586/tches.v2025.i1.128-159","title":"Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting","display_name":"Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting","publication_year":2024,"publication_date":"2024-12-09","ids":{"openalex":"https://openalex.org/W4405242250","doi":"https://doi.org/10.46586/tches.v2025.i1.128-159"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i1.128-159","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i1.128-159","pdf_url":"https://metalla.org/index.php/TCHES/article/download/11925/11784","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://metalla.org/index.php/TCHES/article/download/11925/11784","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113119457","display_name":"Shipei Qu","orcid":"https://orcid.org/0009-0005-3324-0021"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shipei Qu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102840410","display_name":"Yuxuan Wang","orcid":"https://orcid.org/0009-0003-2117-7059"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxuan Wang","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119738848","display_name":"Jintong Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jintong Yu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101588964","display_name":"Chi Zhang","orcid":"https://orcid.org/0000-0003-1900-1284"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5113119457"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":1.3413,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84860029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"2025","issue":"1","first_page":"128","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8574962615966797},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7806244492530823},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6666994094848633},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5097526907920837},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.503983199596405},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4928743839263916},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46391645073890686},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.428072988986969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39003968238830566},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.21263745427131653},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.20400470495224},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.17145565152168274},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.113840252161026},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10766494274139404}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8574962615966797},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7806244492530823},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6666994094848633},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5097526907920837},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.503983199596405},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4928743839263916},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46391645073890686},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.428072988986969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39003968238830566},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.21263745427131653},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.20400470495224},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.17145565152168274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.113840252161026},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10766494274139404},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2025.i1.128-159","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i1.128-159","pdf_url":"https://metalla.org/index.php/TCHES/article/download/11925/11784","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c8f04ce7f81746d7a49e74dd211db1a5","is_oa":true,"landing_page_url":"https://doaj.org/article/c8f04ce7f81746d7a49e74dd211db1a5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i1.128-159","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i1.128-159","pdf_url":"https://metalla.org/index.php/TCHES/article/download/11925/11784","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2080338196","display_name":null,"funder_award_id":"SFYF at SJTU","funder_id":"https://openalex.org/F4320322999","funder_display_name":"Shanghai Jiao Tong University"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2802911279","display_name":null,"funder_award_id":"Young","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3772568342","display_name":null,"funder_award_id":"U2336210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4009049029","display_name":null,"funder_award_id":"Startup","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322999","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405242250.pdf","grobid_xml":"https://content.openalex.org/works/W4405242250.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W2043669269","https://openalex.org/W4254460476","https://openalex.org/W4388856880"],"abstract_inverted_index":{"A":[0],"common":[1],"assumption":[2,25],"in":[3,45,82,286,307],"side-channel":[4,96,113,134,152,201,229],"analysis":[5],"is":[6,54,79,103],"that":[7,123,141,190,301,322],"the":[8,11,16,27,30,41,46,51,63,67,75,128,143,150,163,176,179,194,198,205,212,221,227,240,270,291,323,329],"attacker":[9],"knows":[10],"cryptographic":[12,100,172,259],"algorithm":[13],"implementation":[14],"of":[15,29,69,131,146,165,170,197,208,242,272,328],"victim.":[17],"However,":[18],"many":[19,70],"labsetting":[20],"studies":[21],"implicitly":[22],"extend":[23],"this":[24,109],"to":[26,36,111,185,193,316],"knowledge":[28],"source":[31,52],"code,":[32],"by":[33,225],"inserting":[34],"triggers":[35],"measure,":[37],"locate":[38,278],"or":[39,284,310],"align":[40],"Cryptographic":[42],"Operations":[43],"(CO)":[44],"trace.":[47],"For":[48,178],"real-world":[49,263,335],"attacks,":[50],"code":[53,90,173],"typically":[55],"unavailable,":[56],"which":[57,275],"poses":[58],"a":[59,118,139,155,183,233,262,295],"challenge":[60,164],"for":[61,95,127,220,334],"locating":[62,130,166],"COs":[64,132,167,199,243],"thus":[65],"reducing":[66],"effectiveness":[68,271],"methods.":[71],"In":[72],"contrast,":[73],"obtaining":[74],"(partial)":[76],"binary":[77,89,125,147,158,187,292],"firmware":[78,293],"more":[80],"prevalent":[81],"practical":[83,333],"attacks":[84,97],"on":[85,98,107,133,211,232,255],"embedded":[86],"devices.":[87,250],"While":[88],"theoretically":[91],"encapsulates":[92],"necessary":[93],"information":[94,110,126],"software-implemented":[99],"algorithms,":[101],"there":[102],"no":[104],"systematic":[105],"study":[106],"leveraging":[108],"facilitate":[112],"analysis.":[114],"This":[115],"paper":[116],"introduces":[117],"novel":[119],"and":[120,258,294,313,325],"general":[121],"framework":[122],"utilizes":[124],"automated":[129],"traces.":[135,202],"We":[136,251],"first":[137],"present":[138],"mechanism":[140],"maps":[142],"execution":[144,174],"flow":[145],"instructions":[148,210],"onto":[149],"corresponding":[151],"trace":[153],"through":[154],"tailored":[156],"static":[157],"instrumentation":[159],"process,":[160],"thereby":[161],"transforming":[162],"into":[168],"one":[169],"tracing":[171],"within":[175,200,244],"binary.":[177],"latter,":[180],"we":[181,214,236],"propose":[182],"method":[184,303],"retrieve":[186],"instruction":[188],"addresses":[189],"are":[191,332],"equivalent":[192],"segmenting":[195],"boundaries":[196],"By":[203],"identifying":[204],"mapping":[206],"points":[207],"these":[209],"trace,":[213],"can":[215,237,276],"obtain":[216],"accurate":[217],"segmentation":[218],"labeling":[219],"sidechannel":[222],"data.":[223],"Further,":[224],"employing":[226],"well-labeled":[228],"segments":[230],"obtained":[231],"profiling":[234,296],"device,":[235],"readily":[238],"identify":[239],"locations":[241],"traces":[245,288,312],"collected":[246],"from":[247],"un-controllable":[248],"target":[249],"evaluate":[252],"our":[253,273,302],"approach":[254,331],"various":[256],"devices":[257],"software,":[260],"including":[261],"secure":[264],"boot":[265],"program.":[266],"The":[267],"results":[268],"demonstrate":[269],"method,":[274],"automatically":[277],"typical":[279],"COs,":[280],"such":[281],"as":[282],"AES":[283],"ECDSA,":[285],"raw":[287],"using":[289],"only":[290],"device.":[297],"Comparison":[298],"experiments":[299],"indicate":[300],"outperforms":[304],"existing":[305],"techniques":[306],"handling":[308],"noisy":[309],"jittery":[311],"scales":[314],"better":[315],"complex":[317],"COs.":[318],"Performance":[319],"evaluation":[320],"confirms":[321],"runtime":[324],"storage":[326],"overheads":[327],"proposed":[330],"deployment.":[336]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2025-10-10T00:00:00"}
