{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:16:23Z","timestamp":1742940983108,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030983468"},{"type":"electronic","value":"9783030983475"}],"license":[{"start":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T00:00:00Z","timestamp":1330041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T00:00:00Z","timestamp":1330041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98347-5_12","type":"book-chapter","created":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T14:04:15Z","timestamp":1661177055000},"page":"287-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Voltage Overscaling Techniques for Security Applications"],"prefix":"10.1007","author":[{"given":"Md Tanvir","family":"Arafin","sequence":"first","affiliation":[]},{"given":"Qian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/ASPDAC.2017.7858345","volume-title":"2017 22nd Asia and South Pacific design automation conference (ASP-DAC)","author":"MT Arafin","year":"2017","unstructured":"Arafin MT, Gao M, Qu G. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications. In: 2017 22nd Asia and South Pacific design automation conference (ASP-DAC). Piscataway: IEEE; 2017. p. 336\u2013341."},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3084447","volume":"1","author":"KK Chang","year":"2017","unstructured":"Chang KK, Ya\u011fl\u0131k\u00e7\u0131, AG, Ghose S, Agrawal A, Chatterjee N, Kashyap A, Lee D, O\u2019Connor M, Hassan H, Mutlu O. Understanding reduced-voltage operation in modern DRAM devices: experimental characterization, analysis, and mechanisms. Proc ACM Meas Analy Comput Syst 2017;1(1):1\u201342.","journal-title":"Proc ACM Meas Analy Comput Syst"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 2015. p. 1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"issue":"6","key":"12_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2017.176","volume":"50","author":"M Gao","year":"2017","unstructured":"Gao M, Wang Q, Arafin MT, Lyu Y, Qu G. Approximate computing for low power and security in the internet of things. Computer 2017;50(6):27\u201334.","journal-title":"Computer"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/HST.2015.7140247","volume-title":"2015 IEEE international symposium on hardware oriented security and trust (HOST)","author":"R Gilmore","year":"2015","unstructured":"Gilmore R, Hanley N, O\u2019Neill M. Neural network based attack on a masked implementation of AES. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). Piscataway: IEEE; 2015. p. 106\u2013111."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Hassan H, Patel M, Kim JS, Yaglikci AG, Vijaykumar N, Ghiasi NM, Ghose S, Mutlu O. CROW: a low-cost substrate for improving DRAM performance, energy efficiency, and reliability. In: 2019 ACM\/IEEE 46th annual international symposium on computer architecture (ISCA). 2019. p. 129\u2013142.","DOI":"10.1145\/3307650.3322231"},{"issue":"12","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/43.811318","volume":"18","author":"I Hong","year":"1999","unstructured":"Hong I, Kirovski D, Qu G, Potkonjak M, Srivastava MB. Power optimization of variable-voltage core-based systems. IEEE Trans Comput-Aided Des Integr Circuits Syst. 1999;18(12):1702\u20131714.","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: a first study. J Cryptograp Eng. 2011;1(4):293.","journal-title":"J Cryptograp Eng"},{"key":"12_CR9","unstructured":"ITRS Reports"},{"key":"12_CR10","unstructured":"Lee JW, Lim D, Gassend B, Suh GE, Van Dijk M, Devadas S. A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 symposium on VLSI circuits, 2004. Digest of technical papers. Piscataway: IEEE; 2004. p. 176\u2013179."},{"issue":"12","key":"12_CR11","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/JPROC.2020.3030121","volume":"108","author":"W Liu","year":"2020","unstructured":"Liu W, Gu C, O\u2019Neill M, Qu G, Montuschi P, Lombardi F. Security in approximate computing and approximate computing for security: challenges and opportunities. Proc IEEE 2020;108(12):2214\u20132231.","journal-title":"Proc IEEE"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Murdock K, Oswald D, Garcia FD, Van Bulck J, Gruss D, Piessens F. Plundervolt: software-based fault injection attacks against Intel SGX. In: 2020 IEEE symposium on security and privacy (SP). 2020.","DOI":"10.1109\/SP40000.2020.00057"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/3140659.3080242","volume":"45","author":"M Patel","year":"2017","unstructured":"Patel M, Kim JS, Mutlu O. The reach profiler (REAPER): enabling the mitigation of DRAM retention failures via profiling at aggressive conditions. ACM SIGARCH Comput Archit News 2017;45(2):255\u2013268.","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Qiu P, Wang D, Lyu Y, Qu G. VoltJockey: breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. New York, NY, 2019, CCS \u201919, Association for Computing Machinery. 2019. p. 195\u2013209.","DOI":"10.1145\/3319535.3354201"},{"key":"12_CR15","first-page":"1","volume-title":"2019 Asian hardware oriented security and trust symposium (AsianHOST)","author":"P Qiu","year":"2019","unstructured":"Qiu P, Wang D, Lyu Y, Qu G. VoltJockey: breaking SGX by software-controlled voltage-induced hardware faults. In: 2019 Asian hardware oriented security and trust symposium (AsianHOST). Piscataway: IEEE; 2019. p. 1\u20136."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Rahmati A, Hicks M, Holcomb DE, Fu K. Probable cause: the deanonymizing effects of approximate DRAM. In: Proceedings of the 42nd annual international symposium on computer architecture. 2015. p. 604\u2013615.","DOI":"10.1145\/2749469.2750419"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Son YH, Seongil O, Ro Y, Lee JW, Ahn JH. Reducing memory access latency with asymmetric DRAM bank organizations. In: Proceedings of the 40th annual international symposium on computer architecture. 2013. p. 380\u2013391.","DOI":"10.1145\/2485922.2485955"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/MSE.2007.44","volume-title":"2007 IEEE international conference on microelectronic systems education (MSE\u201907)","author":"J Stine","year":"2007","unstructured":"Stine JE, Castellanos I, Wood M, Henson J, Love F, Davis WR, Franzon PD, Bucher M, Basavarajaiah S, Oh J, et al. FreePDK: an open-source variation-aware design kit. In: 2007 IEEE international conference on microelectronic systems education (MSE\u201907). Piscataway: IEEE; 2007. p. 173\u2013174."},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/AsianHOST.2018.8607173","volume-title":"2018 Asian hardware oriented security and trust symposium (AsianHOST)","author":"H Su","year":"2018","unstructured":"Su H, Zhang J. Machine learning attacks on voltage over-scaling-based lightweight authentication. In: 2018 Asian hardware oriented security and trust symposium (AsianHOST). Piscataway: IEEE; 2018. p. 50\u201355."},{"key":"12_CR20","unstructured":"Tang A, Sethumadhavan S, Stolfo S. {CLKSCREW}: exposing the perils of security-oblivious energy management. In: 26th {USENIX} security symposium ({USENIX} security 17). 2017. p. 1057\u20131074."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Tehranipoor F, Karimian N, Xiao K, Chandy J. DRAM based intrinsic physical unclonable functions for system level security. In: Proceedings of the 25th edition on great lakes symposium on VlSI. 2015. p. 15\u201320.","DOI":"10.1145\/2742060.2742069"},{"key":"12_CR22","first-page":"667","volume-title":"Proceedings of the international conference on computer-aided design","author":"R Venkatesan","year":"2011","unstructured":"Venkatesan R, Agarwal A, Roy K, Raghunathan A. MACACO: Modeling and analysis of circuits for approximate computing. In: Proceedings of the international conference on computer-aided design. Piscataway: IEEE Press; 2011. p. 667\u2013673."},{"key":"12_CR23","first-page":"1","volume-title":"2020 Asian hardware oriented security and trust symposium (AsianHOST)","author":"Q Xu","year":"2020","unstructured":"Xu Q, Arafin MT, Qu G. MIDAS: model inversion defenses using an approximate memory system. In: 2020 Asian hardware oriented security and trust symposium (AsianHOST). Piscataway: IEEE; 2020. p. 1\u20134."},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TC.2021.3049543","volume":"71","author":"J Zhang","year":"2021","unstructured":"Zhang J, Shen C, Su H, Arafin MT, Qu G. Voltage over-scaling-based lightweight authentication for IoT security. IEEE Trans Comp. 2021;71:323\u2013336.","journal-title":"IEEE Trans Comp."},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Zhao W, Cao Y. Predictive technology model for nano-CMOS design exploration. ACM J Emerg Technolog Comput Syst. 2007;3(1):1\u2013es.","DOI":"10.1145\/1229175.1229176"}],"container-title":["Approximate Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98347-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T14:14:07Z","timestamp":1661177647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98347-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,24]]},"ISBN":["9783030983468","9783030983475"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98347-5_12","relation":{},"subject":[],"published":{"date-parts":[[2012,2,24]]},"assertion":[{"value":"24 February 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}