{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:55:38Z","timestamp":1755798938732,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031544088"},{"type":"electronic","value":"9783031544095"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_1","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Microarchitectural Insights into\u00a0Unexplained Behaviors Under Clock Glitch Fault Injection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1374-3757","authenticated-orcid":false,"given":"Ihab","family":"Alshaer","sequence":"first","affiliation":[]},{"given":"Brice","family":"Colombier","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Deleuze","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Beroulle","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Maistri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TDSC.2009.1","volume":"7","author":"M Alioto","year":"2010","unstructured":"Alioto, M., Poli, M., Rocchi, S.: Differential power analysis attacks to precharged buses: a general analysis for symmetric-key cryptographic algorithms. IEEE Trans. Dependable Secure Comput. 7(3), 226\u2013239 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Alshaer, I., Colombier, B., Deleuze, C., Beroulle, V., Maistri, P.: Variable-length instruction set: feature or bug? In: 25th Euromicro Conference on Digital System Design, pp. 464\u2013471. IEEE, Maspalomas (2022)","DOI":"10.1109\/DSD57027.2022.00068"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"114841","DOI":"10.1016\/j.microrel.2022.114841","volume":"139","author":"I Alshaer","year":"2022","unstructured":"Alshaer, I., Colombier, B., Deleuze, C., Maistri, P., Beroulle, V.: Cross-layer inference methodology for microarchitecture-aware fault models. Microelectron. Reliab. 139, 114841 (2022)","journal-title":"Microelectron. Reliab."},{"key":"1_CR4","unstructured":"ARM Limited: ARM architecture reference manual Thumb-2 supplement. https:\/\/developer.arm.com\/documentation\/ddi0308\/d. Accessed 24 February 2023"},{"key":"1_CR5","unstructured":"ARM Limited: Armv7-m architecture reference manual. https:\/\/developer.arm.com\/documentation\/ddi0403\/latest. Accessed 24 February 2023"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TDMR.2005.853449","volume":"5","author":"R Baumann","year":"2005","unstructured":"Baumann, R.: Radiation-induced soft errors in advanced semiconductor technologies. IEEE Trans. Device Mater. Reliab. 5(3), 305\u2013316 (2005)","journal-title":"IEEE Trans. Device Mater. Reliab."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptology 14, 101\u2013119 (2001)","journal-title":"J. Cryptology"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Buhren, R., Jacob, H.N., Krachenfels, T., Seifert, J.: One glitch to rule them all: Fault injection attacks against amd\u2019s secure encrypted virtualization. In: Kim, Y., Kim, J., Vigna, G., Shi, E. (eds.) ACM SIGSAC Conference on Computer and Communications Security, pp. 2875\u20132889. ACM, Virtual Event, Republic of Korea (2021)","DOI":"10.1145\/3460120.3484779"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-31271-2_7","volume-title":"Smart Card Research and Advanced Applications","author":"L Dureuil","year":"2016","unstructured":"Dureuil, L., Potet, M.-L., de Choudens, P., Dumas, C., Cl\u00e9di\u00e8re, J.: From code review to fault injection attacks: filling the gap using fault model inference. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 107\u2013124. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_7"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Khelil, F., Hamdi, M., Guilley, S., Danger, J., Selmane, N.: Fault analysis attack on an FPGA AES implementation. In: Aggarwal, A., Badra, M., Massacci, F. (eds.) International Conference on New Technologies, Mobility and Security, pp. 1\u20135. IEEE, Tangier (2008)","DOI":"10.1109\/NTMS.2008.ECP.45"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Khuat, V., Danger, J., Dutertre, J.: Laser fault injection in a 32-bit microcontroller: from the flash interface to the execution pipeline. In: Workshop on Fault Detection and Tolerance in Cryptography, pp. 74\u201385. IEEE, Milan (2021)","DOI":"10.1109\/FDTC53659.2021.00020"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Laurent, J., Deleuze, C., Pebay-Peyroula, F., Beroulle, V.: Bridging the gap between RTL and software fault injection. ACM J. Emerg. Technol. Comput. Syst. 17(3), 38:1\u201338:24 (2021)","DOI":"10.1145\/3446214"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: Fischer, W., Schmidt, J. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013, pp. 77\u201388. IEEE Computer Society (2013)","DOI":"10.1109\/FDTC.2013.9"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10175-0_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C O\u2019Flynn","year":"2014","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243\u2013260. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Proy, J., Heydemann, K., Berzati, A., Maj\u00e9ric, F., Cohen, A.: A first ISA-level characterization of EM pulse effects on superscalar microarchitectures: a secure software perspective. In: International Conference on Availability, Reliability and Security, pp. 7:1\u20137:10. ACM, Canterbury (2019)","DOI":"10.1145\/3339252.3339253"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/cryptography4020015","volume":"4","author":"M Randolph","year":"2020","unstructured":"Randolph, M., Diehl, W.: Power side-channel attack analysis: a review of 20 years of study for the layman. Cryptography 4(2), 15 (2020)","journal-title":"Cryptography"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Shelton, M.A., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: ROSITA: towards automatic elimination of power-analysis leakage in ciphers. In: Annual Network and Distributed System Security Symposium. The Internet Society, Virtual event (2021)","DOI":"10.14722\/ndss.2021.23137"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.P.: Local heating attacks on flash memory devices. In: Tehranipoor, M., Plusquellic, J. (eds.) IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 1\u20136. IEEE Computer Society, San Francisco (2009)","DOI":"10.1109\/HST.2009.5225028"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Spensky, C., et al.: Glitching demystified: analyzing control-flow-based glitching attacks and defenses. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 400\u2013412. IEEE, Taipei (2021)","DOI":"10.1109\/DSN48987.2021.00051"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Timmers, N., Spruyt, A., Witteman, M.: Controlling PC on ARM using fault injection. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 25\u201335. IEEE Computer Society, Santa Barbara (2016)","DOI":"10.1109\/FDTC.2016.18"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Tollec, S., Asavoae, M., Courouss\u00e9, D., Heydemann, K., Jan, M.: Exploration of fault effects on formal RISC-V microarchitecture models. In: Workshop on Fault Detection and Tolerance in Cryptography, pp. 73\u201383. IEEE, Virtual Event\/Italy (2022)","DOI":"10.1109\/FDTC57191.2022.00017"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Trouchkine, T., Bouffard, G., Cl\u00e9di\u00e8re, J.: EM fault model characterization on SoCs: from different architectures to the same fault model. In: Workshop on Fault Detection and Tolerance in Cryptography, pp. 31\u201338. IEEE, Milan (2021)","DOI":"10.1109\/FDTC53659.2021.00014"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T12:01:23Z","timestamp":1711886483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}