Page 463 - 《软件学报》2026年第1期
P. 463

460                                                        软件学报  2026  年第  37  卷第  1  期


                  [3]   Zhang TW, Zhang YQ, Lee RB. CloudRadar: A real-time side-channel attack detection system in clouds. In: Monrose F, Dacier M, Blanc
                     G, Garcia-Alfaro J, eds. Proc. of the 19th Int’l Symp. on Research in Attacks, Intrusions, and Defenses. Paris: Springer, 2016. 118–140.
                     [doi: 10.1007/978-3-319-45719-2_6]
                  [4]   Moos T, Moradi A, Richter B. Static power side-channel analysis—An investigation of measurement factors. IEEE Trans. on Very Large
                     Scale Integration (VLSI) Systems, 2020, 28(2): 376–389. [doi: 10.1109/tvlsi.2019.2948141]
                  [5]   Longo  J,  De  Mulder  E,  Page  D,  Tunstall  M.  SoC  it  to  EM:  Electromagnetic  side-channel  attacks  on  a  complex  system-on-chip.  In:
                     Güneysu  T,  Handschuh  H,  eds.  Proc.  of  the  17th  Int’l  Workshop  on  Cryptographic  Hardware  and  Embedded  Systems.  Saint-Malo:
                     Springer, 2015. 620–640. [doi: 10.1007/978-3-662-48324-4_31]
                  [6]   Baksi A, Bhasin S, Breier J, Jap D, Saha D. A survey on fault attacks on symmetric key cryptosystems. ACM Computing Surveys, 2022,
                     55(4): 86. [doi: 10.1145/3530054]
                  [7]   Mangard S. A Simple Power-Analysis (SPA) attack on implementations of the AES key expansion. In: Lee PJ, Lim CH, eds. Proc. of the
                     5th Int’l Conf. on Information Security and Cryptology. Seoul: Springer, 2002. 343–358. [doi: 10.1007/3-540-36552-4_24]
                  [8]   Kocher P, Jaffe J, Jun B. Differential power analysis. In: Wiener M, ed. Proc. of the 19th Annual Int’l Cryptology Conf. on Advances in
                     Cryptology. Santa Barbara: Springer, 1999. 388–397. [doi: 10.1007/3-540-48405-1_25]
                  [9]   Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Joye M, Quisquater JJ, eds. Proc. of the 6th Int’l
                     Workshop on Cryptographic Hardware and Embedded Systems. Cambridge: Springer, 2004. 16–29. [doi: 10.1007/978-3-540-28632-5_2]
                 [10]   Chen  JC,  Ng  JS,  Chong  KS,  Lin  ZP,  Gwee  BH.  A  novel  normalized  variance-based  differential  power  analysis  against  masking
                     countermeasures. IEEE Trans. on Information Forensics and Security, 2021, 16: 3767–3779. [doi: 10.1109/tifs.2021.3093783]
                 [11]   Chari S, Rao JR, Rohatgi P. Template attacks. In: Kaliski BS, Koc CK, Paar C, eds. Proc. of the 4th Int’l Workshop on Cryptographic
                     Hardware and Embedded Systems. Redwood Shores: Springer, 2003. 13–28. [doi: 10.1007/3-540-36400-5_3]
                 [12]   Schindler W, Lemke K, Paar C. A stochastic model for differential side channel cryptanalysis. In: Rao JR, Sunar B, eds. Proc. of the 7th
                     Int’l Workshop on Cryptographic Hardware and Embedded Systems. Edinburgh: Springer, 2005. 30–46. [doi: 10.1007/11545262_3]
                 [13]   Wu L, Perin G, Picek S. On the evaluation of deep learning-based side-channel analysis. In: Balasch J, O’Flynn C, eds. Proc. of the 13th
                     Int’l Workshop on Constructive Side-channel Analysis and Secure Design. Leuven: Springer, 2022. 49–71. [doi: 10.1007/978-3-030-
                     99766-3_3]
                 [14]   Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: A first study. Journal
                     of Cryptographic Engineering, 2011, 1(4): 293–302. [doi: 10.1007/s13389-011-0023-x]
                 [15]   Belgiu M, Drăguţ L. Random forest in remote sensing: A review of applications and future directions. ISPRS Journal of Photogrammetry
                     and Remote Sensing, 2016, 114: 24–31. [doi: 10.1016/j.isprsjprs.2016.01.011]
                 [16]   Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES. Journal of Cryptographic Engineering,
                     2015, 5(2): 123–139. [doi: 10.1007/s13389-014-0089-3]
                 [17]   Kohonen T, Oja E, Simula O, Visa A, Kangas J. Engineering applications of the self-organizing map. Proc. of the IEEE, 1996, 84(10):
                     1358–1384. [doi: 10.1109/5.537105]
                 [18]   Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In: Carlet C, Hasan MA,
                     Saraswat V, eds. Proc. of the 6th Int’l Conf. on Security, Privacy, and Applied Cryptography Engineering. Hyderabad: Springer, 2016.
                     3–26. [doi: 10.1007/978-3-319-49445-6_1]
                 [19]   Tang JX, Deng CW, Huang GB. Extreme learning machine for multilayer perceptron. IEEE Trans. on Neural Networks and Learning
                     Systems, 2016, 27(4): 809–821. [doi: 10.1109/TNNLS.2015.2424995]
                 [20]   Krizhevsky A, Sutskever I, Hinton GE. ImageNet classification with deep convolutional neural networks. Communications of the ACM,
                     2017, 60(6): 84–90. [doi: 10.1145/3065386]
                 [21]   Benadjila  R,  Prouff  E,  Strullu  R,  Cagli  E,  Dumas  C.  Deep  learning  for  side-channel  analysis  and  introduction  to  ASCAD  database.
                     Journal of Cryptographic Engineering, 2020, 10(2): 163–188. [doi: 10.1007/s13389-019-00220-8]
                 [22]   Zaid  G,  Bossuet  L,  Habrard  A,  Venelli  A.  Methodology  for  efficient  CNN  architectures  in  profiling  attacks.  IACR  Trans.  on
                     Cryptographic Hardware and Embedded Systems, 2020, 1: 1–36. [doi: 10.13154/tches.v2020.i1.1-36]
                 [23]   Wouters L, Arribas V, Gierlichs B, Preneel B. Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans.
                     on Cryptographic Hardware and Embedded Systems, 2020, 3: 147–168. [doi: 10.13154/tches.v2020.i3.147-168]
                 [24]   Hajra S, Chowdhury S, Mukhopadhyay D. EstraNet: An efficient shift-invariant Transformer network for side-channel analysis. IACR
                     Trans. on Cryptographic Hardware and Embedded Systems, 2024, 1: 336–374. [doi: 10.46586/tches.v2024.i1.336-374]
                 [25]   Karayalçın S, Krček M, Wu LC, Picek S, Perin G. It’s a kind of magic: A novel conditional GAN framework for efficient profiling side-
                     channel  analysis.  In:  Proc.  of  the  30th  Int’l  Conf.  on  the  Theory  and  Application  of  Cryptology  and  Information  Security.  Kolkata:
   458   459   460   461   462   463   464   465   466   467   468