Page 463 - 《软件学报》2026年第1期
P. 463
460 软件学报 2026 年第 37 卷第 1 期
[3] Zhang TW, Zhang YQ, Lee RB. CloudRadar: A real-time side-channel attack detection system in clouds. In: Monrose F, Dacier M, Blanc
G, Garcia-Alfaro J, eds. Proc. of the 19th Int’l Symp. on Research in Attacks, Intrusions, and Defenses. Paris: Springer, 2016. 118–140.
[doi: 10.1007/978-3-319-45719-2_6]
[4] Moos T, Moradi A, Richter B. Static power side-channel analysis—An investigation of measurement factors. IEEE Trans. on Very Large
Scale Integration (VLSI) Systems, 2020, 28(2): 376–389. [doi: 10.1109/tvlsi.2019.2948141]
[5] Longo J, De Mulder E, Page D, Tunstall M. SoC it to EM: Electromagnetic side-channel attacks on a complex system-on-chip. In:
Güneysu T, Handschuh H, eds. Proc. of the 17th Int’l Workshop on Cryptographic Hardware and Embedded Systems. Saint-Malo:
Springer, 2015. 620–640. [doi: 10.1007/978-3-662-48324-4_31]
[6] Baksi A, Bhasin S, Breier J, Jap D, Saha D. A survey on fault attacks on symmetric key cryptosystems. ACM Computing Surveys, 2022,
55(4): 86. [doi: 10.1145/3530054]
[7] Mangard S. A Simple Power-Analysis (SPA) attack on implementations of the AES key expansion. In: Lee PJ, Lim CH, eds. Proc. of the
5th Int’l Conf. on Information Security and Cryptology. Seoul: Springer, 2002. 343–358. [doi: 10.1007/3-540-36552-4_24]
[8] Kocher P, Jaffe J, Jun B. Differential power analysis. In: Wiener M, ed. Proc. of the 19th Annual Int’l Cryptology Conf. on Advances in
Cryptology. Santa Barbara: Springer, 1999. 388–397. [doi: 10.1007/3-540-48405-1_25]
[9] Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Joye M, Quisquater JJ, eds. Proc. of the 6th Int’l
Workshop on Cryptographic Hardware and Embedded Systems. Cambridge: Springer, 2004. 16–29. [doi: 10.1007/978-3-540-28632-5_2]
[10] Chen JC, Ng JS, Chong KS, Lin ZP, Gwee BH. A novel normalized variance-based differential power analysis against masking
countermeasures. IEEE Trans. on Information Forensics and Security, 2021, 16: 3767–3779. [doi: 10.1109/tifs.2021.3093783]
[11] Chari S, Rao JR, Rohatgi P. Template attacks. In: Kaliski BS, Koc CK, Paar C, eds. Proc. of the 4th Int’l Workshop on Cryptographic
Hardware and Embedded Systems. Redwood Shores: Springer, 2003. 13–28. [doi: 10.1007/3-540-36400-5_3]
[12] Schindler W, Lemke K, Paar C. A stochastic model for differential side channel cryptanalysis. In: Rao JR, Sunar B, eds. Proc. of the 7th
Int’l Workshop on Cryptographic Hardware and Embedded Systems. Edinburgh: Springer, 2005. 30–46. [doi: 10.1007/11545262_3]
[13] Wu L, Perin G, Picek S. On the evaluation of deep learning-based side-channel analysis. In: Balasch J, O’Flynn C, eds. Proc. of the 13th
Int’l Workshop on Constructive Side-channel Analysis and Secure Design. Leuven: Springer, 2022. 49–71. [doi: 10.1007/978-3-030-
99766-3_3]
[14] Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: A first study. Journal
of Cryptographic Engineering, 2011, 1(4): 293–302. [doi: 10.1007/s13389-011-0023-x]
[15] Belgiu M, Drăguţ L. Random forest in remote sensing: A review of applications and future directions. ISPRS Journal of Photogrammetry
and Remote Sensing, 2016, 114: 24–31. [doi: 10.1016/j.isprsjprs.2016.01.011]
[16] Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES. Journal of Cryptographic Engineering,
2015, 5(2): 123–139. [doi: 10.1007/s13389-014-0089-3]
[17] Kohonen T, Oja E, Simula O, Visa A, Kangas J. Engineering applications of the self-organizing map. Proc. of the IEEE, 1996, 84(10):
1358–1384. [doi: 10.1109/5.537105]
[18] Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In: Carlet C, Hasan MA,
Saraswat V, eds. Proc. of the 6th Int’l Conf. on Security, Privacy, and Applied Cryptography Engineering. Hyderabad: Springer, 2016.
3–26. [doi: 10.1007/978-3-319-49445-6_1]
[19] Tang JX, Deng CW, Huang GB. Extreme learning machine for multilayer perceptron. IEEE Trans. on Neural Networks and Learning
Systems, 2016, 27(4): 809–821. [doi: 10.1109/TNNLS.2015.2424995]
[20] Krizhevsky A, Sutskever I, Hinton GE. ImageNet classification with deep convolutional neural networks. Communications of the ACM,
2017, 60(6): 84–90. [doi: 10.1145/3065386]
[21] Benadjila R, Prouff E, Strullu R, Cagli E, Dumas C. Deep learning for side-channel analysis and introduction to ASCAD database.
Journal of Cryptographic Engineering, 2020, 10(2): 163–188. [doi: 10.1007/s13389-019-00220-8]
[22] Zaid G, Bossuet L, Habrard A, Venelli A. Methodology for efficient CNN architectures in profiling attacks. IACR Trans. on
Cryptographic Hardware and Embedded Systems, 2020, 1: 1–36. [doi: 10.13154/tches.v2020.i1.1-36]
[23] Wouters L, Arribas V, Gierlichs B, Preneel B. Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans.
on Cryptographic Hardware and Embedded Systems, 2020, 3: 147–168. [doi: 10.13154/tches.v2020.i3.147-168]
[24] Hajra S, Chowdhury S, Mukhopadhyay D. EstraNet: An efficient shift-invariant Transformer network for side-channel analysis. IACR
Trans. on Cryptographic Hardware and Embedded Systems, 2024, 1: 336–374. [doi: 10.46586/tches.v2024.i1.336-374]
[25] Karayalçın S, Krček M, Wu LC, Picek S, Perin G. It’s a kind of magic: A novel conditional GAN framework for efficient profiling side-
channel analysis. In: Proc. of the 30th Int’l Conf. on the Theory and Application of Cryptology and Information Security. Kolkata:

