{"id":"https://openalex.org/W7119087140","doi":"https://doi.org/10.48550/arxiv.2601.01054","title":"Out-of-Band Power Side-Channel Detection for Semiconductor Supply Chain Integrity at Scale","display_name":"Out-of-Band Power Side-Channel Detection for Semiconductor Supply Chain Integrity at Scale","publication_year":2026,"publication_date":"2026-01-03","ids":{"openalex":"https://openalex.org/W7119087140","doi":"https://doi.org/10.48550/arxiv.2601.01054"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.01054","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01054","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.01054","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007561444","display_name":"Rajiv Thummala","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thummala, Rajiv","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122235740","display_name":"Katherine Winton","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Winton, Katherine","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122033280","display_name":"Luke Flores","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flores, Luke","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122030918","display_name":"Elizabeth Redmond","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Redmond, Elizabeth","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5052907259","display_name":"Gregory Falco","orcid":"https://orcid.org/0000-0002-6463-7719"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Falco, Gregory","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007561444"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.01940000057220459,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.0032999999821186066,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.7531999945640564},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.7275000214576721},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7075999975204468},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6111999750137329},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5128999948501587},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.483599990606308},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.41179999709129333},{"id":"https://openalex.org/keywords/semiconductor-device-fabrication","display_name":"Semiconductor device fabrication","score":0.40610000491142273}],"concepts":[{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.7531999945640564},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.7275000214576721},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7075999975204468},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6158000230789185},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6111999750137329},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5128999948501587},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.483599990606308},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4259999990463257},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.41179999709129333},{"id":"https://openalex.org/C66018809","wikidata":"https://www.wikidata.org/wiki/Q1570432","display_name":"Semiconductor device fabrication","level":3,"score":0.40610000491142273},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.40610000491142273},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39250001311302185},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.3776000142097473},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3149999976158142},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.30219998955726624},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.2948000133037567},{"id":"https://openalex.org/C52192207","wikidata":"https://www.wikidata.org/wiki/Q5322","display_name":"Capacitor","level":3,"score":0.2939999997615814},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C106436119","wikidata":"https://www.wikidata.org/wiki/Q836575","display_name":"Quality assurance","level":3,"score":0.2840000092983246},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2752000093460083},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.26600000262260437},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.2646999955177307},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25850000977516174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.01054","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01054","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.01054","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01054","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.531355082988739,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Out-of-band":[0],"screening":[1,65,142],"of":[2,56,160],"microcontrollers":[3,80],"is":[4,103,155],"a":[5,63,85,98,120],"major":[6],"gap":[7],"in":[8,43,78,157],"semiconductor":[9,161],"supply":[10,162],"chain":[11,163],"security.":[12],"High-assurance":[13],"techniques":[14,47],"such":[15],"as":[16,119,139,171],"X-ray":[17],"and":[18,26,72,97,132,148,165],"destructive":[19],"reverse":[20],"engineering":[21],"are":[22,92],"accurate":[23],"but":[24],"slow":[25],"expensive,":[27],"hindering":[28],"comprehensive":[29],"detection":[30,126],"for":[31],"hardware":[32],"Trojans":[33],"or":[34],"firmware":[35],"tampering.":[36],"Consequently,":[37],"there":[38],"has":[39],"been":[40],"increased":[41],"interest":[42],"applying":[44],"machine":[45],"learning":[46],"to":[48,75,109,167],"automate":[49],"forensic":[50,150],"examination,":[51],"enabling":[52],"rapid,":[53],"large-scale":[54],"inspection":[55],"components":[57],"without":[58,81],"manual":[59],"oversight.":[60],"We":[61,124],"introduce":[62],"non-destructive":[64],"method":[66,154],"that":[67],"uses":[68],"power":[69,88,112],"side-channel":[70],"measurements":[71,108],"generative":[73,99],"modeling":[74],"detect":[76],"tampering":[77,130],"commodity":[79],"trusted":[82],"hardware.":[83],"As":[84],"proof-of-concept,":[86],"differential":[87],"analysis":[89],"(DPA)":[90],"traces":[91],"collected":[93],"from":[94],"the":[95,158],"ChipWhisperer":[96],"adversarial":[100],"network":[101],"(GAN)":[102],"trained":[104,115],"only":[105],"on":[106,128],"benign":[107],"learn":[110],"nominal":[111],"behavior.":[113],"The":[114,152],"discriminator":[116],"then":[117],"serves":[118],"one-class":[121],"anomaly":[122],"detector.":[123],"report":[125],"performance":[127],"multiple":[129],"scenarios":[131],"discuss":[133],"how":[134],"this":[135],"technique":[136],"can":[137],"serve":[138],"an":[140,172],"intermediate":[141,173],"tier":[143],"between":[144],"basic":[145],"functional":[146],"tests":[147],"high-cost":[149],"analysis.":[151],"proposed":[153],"evaluated":[156],"context":[159],"practice":[164],"policy":[166],"assess":[168],"its":[169],"suitability":[170],"assurance":[174],"mechanism.":[175]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
