{"id":"https://openalex.org/W4411156985","doi":"https://doi.org/10.46586/tches.v2025.i3.389-412","title":"Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis","display_name":"Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411156985","doi":"https://doi.org/10.46586/tches.v2025.i3.389-412"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i3.389-412","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.389-412","pdf_url":"https://philosophymindscience.org/index.php/TCHES/article/download/12221/12028","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://philosophymindscience.org/index.php/TCHES/article/download/12221/12028","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072140240","display_name":"Davide Galli","orcid":"https://orcid.org/0009-0005-9430-7699"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Davide Galli","raw_affiliation_strings":["DEIB, Politecnico di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"DEIB, Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106505058","display_name":"Giuseppe Chiari","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Chiari","raw_affiliation_strings":["DEIB, Politecnico di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"DEIB, Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016373122","display_name":"Davide Zoni","orcid":"https://orcid.org/0000-0002-9951-062X"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Davide Zoni","raw_affiliation_strings":["DEIB, Politecnico di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"DEIB, Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072140240"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":2.8076,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91148495,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2025","issue":"3","first_page":"389","last_page":"412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.9136003255844116},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5730350017547607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5466911196708679},{"id":"https://openalex.org/keywords/market-segmentation","display_name":"Market segmentation","score":0.4880479574203491},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4778715670108795},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3690807819366455},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35794705152511597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27853938937187195},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16778159141540527},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15215545892715454},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.10307979583740234},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.06373414397239685}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.9136003255844116},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5730350017547607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5466911196708679},{"id":"https://openalex.org/C125308379","wikidata":"https://www.wikidata.org/wiki/Q363057","display_name":"Market segmentation","level":2,"score":0.4880479574203491},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4778715670108795},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3690807819366455},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35794705152511597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27853938937187195},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16778159141540527},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15215545892715454},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.10307979583740234},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.06373414397239685}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2025.i3.389-412","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.389-412","pdf_url":"https://philosophymindscience.org/index.php/TCHES/article/download/12221/12028","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b03448f178ef4c0190d3cdaa6f413815","is_oa":true,"landing_page_url":"https://doaj.org/article/b03448f178ef4c0190d3cdaa6f413815","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 3 (2025)","raw_type":"article"},{"id":"pmh:oai:re.public.polimi.it:11311/1293684","is_oa":true,"landing_page_url":"https://hdl.handle.net/11311/1293684","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i3.389-412","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.389-412","pdf_url":"https://philosophymindscience.org/index.php/TCHES/article/download/12221/12028","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411156985.pdf","grobid_xml":"https://content.openalex.org/works/W4411156985.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W59374396","https://openalex.org/W1487461673","https://openalex.org/W1560093457","https://openalex.org/W1562542037","https://openalex.org/W1599906532","https://openalex.org/W2097998348","https://openalex.org/W2188162208","https://openalex.org/W2556867355","https://openalex.org/W2810943746","https://openalex.org/W2915388937","https://openalex.org/W2952010918","https://openalex.org/W2990296674","https://openalex.org/W2996022685","https://openalex.org/W3003917182","https://openalex.org/W3095435957","https://openalex.org/W3126247501","https://openalex.org/W3197325412","https://openalex.org/W3203012334","https://openalex.org/W3208177954","https://openalex.org/W3213857549","https://openalex.org/W3216772124","https://openalex.org/W4281757038","https://openalex.org/W4291214128","https://openalex.org/W4401568857","https://openalex.org/W4402387490","https://openalex.org/W4403296833","https://openalex.org/W4403665793","https://openalex.org/W4408521164"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W4244949874","https://openalex.org/W2425598453"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1],"exploit":[2],"unintended":[3],"information":[4],"leakage":[5,25,97],"emitted":[6],"by":[7,100],"cryptographic":[8,148],"devices":[9],"to":[10,21,37,141,189],"extract":[11],"sensitive":[12],"data.":[13],"Hiding":[14],"techniques":[15],"are":[16,79],"a":[17,42,51,74,106,174,205],"cost-effective":[18],"countermeasure":[19,210],"designed":[20,140],"obfuscate":[22],"the":[23,63,125,131,137,143,158,197,219,222],"side-channel":[24,59,113,132,194,223],"and":[26,92,108,127,160,191],"hinder":[27],"these":[28,46],"attacks.":[29],"Available":[30],"open":[31],"datasets":[32,55],"rely":[33],"on":[34,124],"artificial":[35],"models":[36],"simulate":[38],"hiding":[39,84,201],"effects,":[40],"preventing":[41],"realistic":[43,107,207],"assessment":[44,208],"of":[45,67,118,130,146,162,199,209],"countermeasures":[47],"and,":[48],"thus,":[49],"leaving":[50],"pressing":[52],"need":[53],"for":[54,111,187,217],"offering":[56,153,204],"real-world,":[57,68],"obfuscated":[58,69,80,151],"measurements.":[60],"Chameleon":[61,94,119,182,212],"introduces":[62],"first":[64,138],"comprehensive":[65],"dataset":[66,139],"power":[70],"traces":[71,78],"collected":[72],"from":[73,150],"RISC-V-based":[75],"System-on-Chip.":[76],"The":[77,165],"using":[81],"four":[82],"state-of-the-art":[83,220],"techniques:":[85],"dynamic":[86],"frequency":[87],"scaling,":[88],"random":[89],"delay,":[90],"morphing,":[91],"chaffing.":[93],"captures":[95],"real":[96],"deformations":[98],"introduced":[99],"actual":[101],"hardware":[102],"implementations,":[103],"making":[104],"it":[105],"valuable":[109],"tool":[110,216],"evaluating":[112],"countermeasures.":[114],"A":[115],"key":[116],"feature":[117],"is":[120,136,213],"its":[121],"dual":[122],"focus":[123],"segmentation":[126,172],"attack":[128],"stages":[129],"analysis":[133],"process.":[134],"It":[135],"facilitate":[142],"challenging":[144],"task":[145],"segmenting":[147],"operations":[149],"traces,":[152],"precise":[154],"metadata":[155,167],"that":[156],"pinpoints":[157],"start":[159],"end":[161],"each":[163],"operation.":[164],"high-quality":[166],"enables":[168],"systematic":[169],"research":[170],"into":[171],"techniques,":[173],"critical":[175],"step":[176],"often":[177],"overlooked":[178],"in":[179,221],"previous":[180],"datasets.":[181],"provides":[183],"an":[184,214],"essential":[185],"platform":[186],"researchers":[188],"develop":[190],"test":[192],"new":[193],"attacks,":[195],"highlighting":[196],"vulnerabilities":[198],"current":[200],"techniques.":[202],"By":[203],"more":[206],"effectiveness,":[211],"invaluable":[215],"advancing":[218],"evaluation.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
