“…Such information reveals important details about the internal state of the computer device, such as instructions executed, data processed, states of registers, etc. Previously, side channel information has been widely utilised to extract cryptographic keys from algorithms such as AES [25][26][27] , DES [28,29] and RSA [30] . However, there have also been attempts to use the side channel information of a computer device to reverse engineer embedded applications [31] , verify embedded application runtime integrity [32,33] , identify a device [34] , detect malware [35,36] , etc.…”