{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:45:25Z","timestamp":1767840325885,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642150302","type":"print"},{"value":"9783642150319","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_11","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"158-172","source":"Crossref","is-referenced-by-count":30,"title":["Flash Memory \u2018Bumping\u2019 Attacks"],"prefix":"10.1007","author":[{"given":"Sergei","family":"Skorobogatov","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Xilinx CoolRunner-II CPLDs in Secure Applications. White Paper, \n                    \n                      http:\/\/www.xilinx.com\/support\/documentation\/white_papers\/wp170.pdf"},{"key":"11_CR2","unstructured":"Design Security in Nonvolatile Flash and Antifuse FPGAs. Security Backgrounder, \n                    \n                      http:\/\/www.actel.com\/documents\/DesignSecurity_WP.pdf"},{"key":"11_CR3","unstructured":"Skorobogatov, S.: Semi-invasive attacks \u2013 A new approach to hardware security analysis. Technical Report UCAM-CL-TR-630, University of Cambridge, Computer Laboratory (April 2005), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-630.pdf"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"11_CR5","doi-asserted-by":"crossref","DOI":"10.1109\/9780470545409","volume-title":"Nonvolatile semiconductor memory technology: a comprehensive guide to understanding and using NVSM devices","author":"W.D. Brown","year":"1997","unstructured":"Brown, W.D., Brewer, J.E.: Nonvolatile semiconductor memory technology: a comprehensive guide to understanding and using NVSM devices. IEEE Press, Los Alamitos (1997)"},{"key":"11_CR6","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper resistance \u2013 a cautionary note. In: The Second USENIX Workshop on Electronic Commerce, Oakland, California (November 1996)"},{"key":"11_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4919-2","volume-title":"Failure Analysis of Integrated Circuits: Tools and Techniques","author":"L.C. Wagner","year":"1999","unstructured":"Wagner, L.C.: Failure Analysis of Integrated Circuits: Tools and Techniques. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"11_CR8","unstructured":"Tobias, M.W.: Opening locks by bumping in five seconds or less: is it really a threat to physical security? A technical analysis of the issues, Investigative Law Offices, \n                    \n                      http:\/\/podcasts.aolcdn.com\/engadget\/videos\/lockdown\/bumping_040206.pdf"},{"key":"11_CR9","unstructured":"NEC PD789104A, 789114A, 789124A, 789134A Subseries User\u2019s Manual. 8-Bit Single-Chip Microcontrollers, \n                    \n                      http:\/\/www2.renesas.com\/maps_download\/pdf\/U13037EJ1V0PM00.pdf"},{"key":"11_CR10","unstructured":"NEC 78K\/0, 78K\/0S Series 8-Bit Single-Chip Microcontrollers. Flash Memory Write. Application Note, \n                    \n                      http:\/\/www.necel.com\/nesdis\/image\/U14458EJ1V0AN00.pdf"},{"key":"11_CR11","unstructured":"Actel ProASIC3 Handbook. ProASIC3 Flash Family FPGAs, \n                    \n                      http:\/\/www.actel.com\/documents\/PA3_HB.pdf"},{"key":"11_CR12","unstructured":"Actel: ISP and STAPL. Application Note AC171, \n                    \n                      http:\/\/www.actel.com\/documents\/ISP_STAPL_AN.pdf"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"14","key":"11_CR14","first-page":"37","volume":"43","author":"C. Ajluni","year":"1995","unstructured":"Ajluni, C.: Two new imaging techniques promise to improve IC defect identification. Electronic Design\u00a043(14), 37\u201338 (1995)","journal-title":"Electronic Design"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11506447_4","volume-title":"Advanced Encryption Standard \u2013 AES","author":"C. Giraud","year":"2005","unstructured":"Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2004. LNCS, vol.\u00a03373, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"11_CR16","unstructured":"Actel ProASIC3\/E Production FPGAs. Features and Advantages, \n                    \n                      http:\/\/www.actel.com\/documents\/PA3_E_Tech_WP.pdf"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/FDTC.2009.39","volume-title":"6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009)","author":"S. Skorobogatov","year":"2009","unstructured":"Skorobogatov, S.: Using Optical Emission Analysis for Estimating Contribution to Power Analysis. In: 6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), Lausanne, Switzerland, September 2009, pp. 111\u2013119. IEEE-CS Press, Los Alamitos (2009) ISBN 978-0-7695-3824-2"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:45:12Z","timestamp":1619786712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}