{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:13:32Z","timestamp":1771330412222,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030997656","type":"print"},{"value":"9783030997663","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99766-3_6","type":"book-chapter","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:20:19Z","timestamp":1648232419000},"page":"125-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Body Biasing Injection: To Thin or Not to Thin the Substrate?"],"prefix":"10.1007","author":[{"given":"G.","family":"Chancel","sequence":"first","affiliation":[]},{"given":"J.-M.","family":"Galliere","sequence":"additional","affiliation":[]},{"given":"P.","family":"Maurine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Aumueller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Concrete results and practical countermeasures. In: CHES, Fault attacks on RSA with CRT (2002)","DOI":"10.1007\/3-540-36400-5_20"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-29912-4_12","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"P Bayon","year":"2012","unstructured":"Bayon, P., et al.: Contactless electromagnetic active attack on ring oscillator based true random number generator. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 151\u2013166. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_12"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Beringuier-Boher, N., Lacruche, M., El-Baze, D., Dutertre, J.-M., Rigaud, J.-B., Maurine, P.: Body biasing injection attacks in practice. In: Palkovic, M., Agosta, G., Barenghi, A., Koren, I., elosi, G., (eds.), Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, 20 January 2016, pp. 49\u201354. ACM (2016)","DOI":"10.1145\/2858930.2858940"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TCAD.2020.3003287","volume":"40","author":"M Dumont","year":"2021","unstructured":"Dumont, M., Lisart, M., Maurine, P.: Modeling and simulating electromagnetic fault injection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(4), 680\u2013693 (2021)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"El-Baze, D., Rigaud, J.-B., Maurine, P.: An embedded digital sensor against EM and BB fault injection. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, August 16, 2016, pp. 78\u201386. IEEE Computer Society (2016)","DOI":"10.1109\/FDTC.2016.14"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Maurine, P.: Techniques for EM fault injection: equipments and experimental results. In: Bertoni, G., Gierlichs, B., (eds.) 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, 9 September 2012, pp. 3\u20134. IEEE Computer Society (2012)","DOI":"10.1109\/FDTC.2012.21"},{"key":"6_CR7","unstructured":"Maurine, P., Tobich, K., Ordas, T., Liardet, P.Y.: Yet another fault injection technique : by forward body biasing injection. In: YACC 2012: Yet Another Conference on Cryptography, Porquerolles Island, France, September 2012"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-68487-7_11","volume-title":"Smart Card Research and Advanced Applications","author":"C O\u2019Flynn","year":"2021","unstructured":"O\u2019Flynn, C.: Low-cost body biasing injection (BBI) attacks on WLCSP devices. In: Liardet, P.-Y., Mentens, N. (eds.) CARDIS 2020. LNCS, vol. 12609, pp. 166\u2013180. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_11"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Poggi, D., Ordas, T., Sarafianos, A., Maurine, P.: Checking robustness against EM side-channel attacks prior to manufacturing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 1 (2021)","DOI":"10.1109\/TCAD.2021.3092297"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_2"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Tobich, K., Maurine, P., Liardet, P.-Y., Lisart, M., Ordas, T.: Voltage spikes on the substrate to obtain timing faults. In: 2013 Euromicro Conference on Digital System Design, DSD 2013, Los Alamitos, CA, USA, 4\u20136 September 2013, pp. 483\u2013486. IEEE Computer Society (2013)","DOI":"10.1109\/DSD.2013.146"},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1109\/TCAD.2019.2928972","volume":"39","author":"RAC Viera","year":"2020","unstructured":"Viera, R.A.C., Maurine, P., Dutertre, J.-M., Bastos, R.P.: Simulation and experimental demonstration of the importance of IR-drops during laser fault injection. IEEE. Trans. Comput. Aided Des. Integr. Circuits Syst. 39(6), 1231\u20131244 (2020)","journal-title":"IEEE. Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Yanci, A.G., Pickles, S., Arslan, T.: Detecting voltage glitch attacks on secure devices. In: 2008 Bio-Inspired, Learning and Intelligent Systems for Security, pp. 75\u201380. IEEE (2008)","DOI":"10.1109\/BLISS.2008.26"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Zussa, L., et al.: Efficiency of a glitch detector against electromagnetic fault injection. In: 2014 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE.2014.216"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99766-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T01:03:26Z","timestamp":1726880606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99766-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030997656","9783030997663"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99766-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}