{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:15:26Z","timestamp":1761174926997,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032017987","type":"print"},{"value":"9783032017994","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01799-4_7","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:47:55Z","timestamp":1761119275000},"page":"113-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigation of\u00a0EM Fault Injection on\u00a0Emerging Lightweight Neural Network Hardware"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5237-5857","authenticated-orcid":false,"given":"Bhanprakash","family":"Goswami","sequence":"first","affiliation":[]},{"given":"Reejit","family":"Chetry","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5124-9582","authenticated-orcid":false,"given":"Chithambara","family":"Moorthii J","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1417-3570","authenticated-orcid":false,"given":"Manan","family":"Suri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Mittal, S., Gupta, H., Srivastava, S.: A survey on hardware security of DNN models and accelerators. J. Syst. Archit. 117, 102163 (2021)","DOI":"10.1016\/j.sysarc.2021.102163"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Boku, K., et al.: FRAM memory technology - advantages for low power, fast write, high endurance applications. In: Proceedings. 2005 International Conference on Computer Design, San Jose, CA, USA, pp. 485 (2005). https:\/\/doi.org\/10.1109\/ICCD.2005.60.","DOI":"10.1109\/ICCD.2005.60."},{"key":"7_CR3","unstructured":"https:\/\/www.globenewswire.com\/news-release\/2021\/06\/23\/2252222\/0\/en\/FRAM-Market-is-Projected-to-Reach-USD-343-2-Million-By-2025-Growing-at-a-3-78-CAGR-Report-by-Market-Research-Future-MRFR.html"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Chakraborty, S., Das, T., Suri, M.: Investigation of voltage fault injection attacks on NN inference utilizing NVM based weight storage. In: 2023 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Hyderabad, India, pp. 26\u201330 (2023). https:\/\/doi.org\/10.1109\/APCCAS60141.2023.00018.","DOI":"10.1109\/APCCAS60141.2023.00018."},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.13154\/tches.v2019.i2.199-224","volume":"2019","author":"C Bozzato","year":"2019","unstructured":"Bozzato, C., Focardi, R., Palmarini, F.: Shaping the glitch: optimizing voltage fault injection attacks. TCHES 2019(2), 199\u2013224 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.199-224","journal-title":"TCHES"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Khan, M.N.I., Ghosh, S.: Fault injection attacks on emerging non-volatile memory and countermeasures. In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2018), 2018, Association for Computing Machinery, New York, NY, USA, Article 10, pp. 1\u20138 (2018). https:\/\/doi.org\/10.1145\/3214292.3214302","DOI":"10.1145\/3214292.3214302"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Goswami, B., Suri, M.: Experimental investigation of EM side channel and FI attacks on commercial FRAM Chips. In: 8th IEEE Electron Devices Technology & Manufacturing Conference (EDTM). Bangalore, India, vol. 2024, 1\u20133 (2024). https:\/\/doi.org\/10.1109\/EDTM58488.2024.10511546","DOI":"10.1109\/EDTM58488.2024.10511546"},{"key":"7_CR8","unstructured":"Fujitsu Semiconductor Memory Solution Data Sheet, Memory FeRAM, MB85R1002A, doc. Number: DS501-00004-6v1E Rev. H, dated May (2023)"},{"key":"7_CR9","unstructured":"Howard, A.G., et al.: MobileNets: efficient convolutional neural networks for mobile vision applications. arXiv:1704.04861 (2017)"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90.","DOI":"10.1109\/CVPR.2016.90."},{"key":"7_CR11","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: Proceedings of the International Conference on the Machine Learning, pp. 6105\u20136114 (2019)"},{"key":"7_CR12","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Goswami, B., Moorthii J, C., Bansal, H., Sajwan, A., Suri, M.: Investigation of security vulnerabilities in NVM based persistent TinyML hardware. In: IEEE Embedded Systems Letters, Early Access (2024) https:\/\/doi.org\/10.1109\/LES.2024.3496508","DOI":"10.1109\/LES.2024.3496508"},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TDMR.2020.3012430","volume":"20","author":"MM Hasan","year":"2020","unstructured":"Hasan, M.M., Ray, B.: Reliability of NAND flash memory as a weight storage device of artificial neural network. IEEE Trans. Device Mater. Reliab. 20(3), 596\u2013603 (2020). https:\/\/doi.org\/10.1109\/TDMR.2020.3012430","journal-title":"IEEE Trans. Device Mater. Reliab."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Breier, J., Hou, X., Jap, D., Ma, L., Bhasin, S., Liu, Y.: Practical fault attack on deep neural networks. In: Proceedings ACM SIGSAC Conference Computer and Communications Security, pp. 2204\u20132206 (2018)","DOI":"10.1145\/3243734.3278519"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Jap, D., Kr\u010dek, M., Picek, S., Ravi, P.: Practical electromagnetic fault injection on intel neural compute stick 2, Cryptology ePrint Archive, Paper 2025\/192 (2025). https:\/\/eprint.iacr.org\/2025\/192","DOI":"10.23919\/DATE64628.2025.10993242"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01799-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:47:57Z","timestamp":1761119277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01799-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9783032017987","9783032017994"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01799-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}