{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:30:06Z","timestamp":1767853806131,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000735","name":"University of Cambridge","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000735","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s41635-018-0050-5","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T02:15:13Z","timestamp":1539224113000},"page":"314-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9414-6489","authenticated-orcid":false,"given":"Sergei","family":"Skorobogatov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"50_CR1","unstructured":"A Guide to Understanding Data Remanence in Automated Information Systems. Version 2, September 1991, NSA\/NCSC Rainbow Series"},{"key":"50_CR2","unstructured":"Gutmann P Secure deletion of data from magnetic and solid-state memory. 6th USENIX Security Symposium, July 1996, pp 77\u201389"},{"key":"50_CR3","unstructured":"Anderson RJ, Kuhn MG (1996) Tamper resistance \u2013 a cautionary note. The Second USENIX Workshop on e-Commerce"},{"key":"50_CR4","volume-title":"Low temperature data remanence in static RAM. Technical Report UCAM-CL-TR-536","author":"S Skorobogatov","year":"2002","unstructured":"Skorobogatov S (2002) Low temperature data remanence in static RAM. Technical Report UCAM-CL-TR-536. University of Cambridge, Computer Laboratory, Cambridge"},{"key":"50_CR5","unstructured":"Gutmann P Data remanence in semiconductor devices. 10th USENIX Security Symposium, Washington, D.C., August 13\u201317, 2001"},{"key":"50_CR6","first-page":"339","volume-title":"Data remanence in flash memory devices. CHES 2005, LNCS 3659","author":"S Skorobogatov","year":"2005","unstructured":"Skorobogatov S (2005) Data remanence in flash memory devices. CHES 2005, LNCS 3659. Springer-Verlag, Berlin, pp 339\u2013353"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Koscher K et al (2010) Experimental security analysis of a modern automobile. IEEE Symposium on Security and Privacy, Oakland","DOI":"10.1109\/SP.2010.34"},{"key":"50_CR8","unstructured":"Checkoway S et al (2011) Comprehensive experimental analyses of automotive attack surfaces. USENIX Security, 10\u201312"},{"key":"50_CR9","unstructured":"Weingart SH (1987) Physical security for the mABYSS system. IEEE Computer Society Conference on Security and Privacy, pp 52\u201358"},{"key":"50_CR10","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"SW Smith","year":"1999","unstructured":"Smith SW, Weingart S (1999) Building a high-performance, programmable secure coprocessor. Comput Netw 31:831\u2013860","journal-title":"Comput Netw"},{"key":"50_CR11","first-page":"302","volume-title":"Weingart. Physical security devices for computer subsystems: a survey of attacks and defenses. CHES 2000","author":"H Steve","year":"1965","unstructured":"Steve H (1965) Weingart. Physical security devices for computer subsystems: a survey of attacks and defenses. CHES 2000. Springer-Verlag LNCS, Berlin, pp 302\u2013317"},{"key":"50_CR12","doi-asserted-by":"publisher","first-page":"095010","DOI":"10.1088\/1674-4926\/30\/9\/095010","volume":"30","author":"Y Kai","year":"2009","unstructured":"Kai Y, Xuecheng Z, Guoyi Y, Weixu W (2009) Security strategy of powered-off SRAM for resisting physical attack to data remanence. J Semicond 30:095010","journal-title":"J Semicond"},{"key":"50_CR13","unstructured":"DS5250 high-speed secure microcontroller. \n                    http:\/\/www.maximintegrated.com\/en\/products\/digital\/microcontrollers\/DS5250.html"},{"issue":"5","key":"50_CR14","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/5.220908","volume":"81","author":"S Aritome","year":"1993","unstructured":"Aritome S, Shirota R, Hemink G, Endoh T, Masuoka F (1993) Reliability issues of flash memory cells. Proc IEEE 81(5):776\u2013788","journal-title":"Proc IEEE"},{"key":"50_CR15","unstructured":"Lecuyer P (2002) Reliability prediction for microcontrollers with embedded EEPROM. ESCCON 2002, pp 67\u201371"},{"key":"50_CR16","unstructured":"Chen Y et al (2003) EEPROM bit failure investigation. 6th Military and Aerospace Programmable Logic Devices International Conference"},{"key":"50_CR17","unstructured":"SCADA. \n                    http:\/\/en.wikipedia.org\/wiki\/SCADA"},{"key":"50_CR18","unstructured":"MC68HC11A8 HCMOS single-chip microcontroller, Freescale Semiconductor Inc. \n                    http:\/\/www.freescale.com\/files\/microcontrollers\/doc\/data_sheet\/MC68HC11A8.pdf"},{"key":"50_CR19","unstructured":"Skorobogatov S (2005) Semi-invasive attacks \u2013 a new approach to hardware security analysis. UCAM-CL-TR-630"},{"key":"50_CR20","unstructured":"K\u00f6mmerling O, Kuhn MG (1999) Design principles for tamper-resistant smartcard processors. USENIX Workshop on SC Technology"},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Skorobogatov S (2017) How microprobing can attack encrypted memory. Euromicro Conference on Digital System Design, AHSA","DOI":"10.1109\/DSD.2017.69"},{"key":"50_CR22","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1016\/j.microrel.2005.07.055","volume":"45","author":"C Nardi De","year":"2005","unstructured":"De Nardi C et al (2005) Oxide charge measurements in EEPROM devices. Microelectron Reliab 45:1514\u20131519","journal-title":"Microelectron Reliab"},{"key":"50_CR23","volume-title":"Reverse engineering Flash EEPROM memories using scanning electron microscopy. CARDIS 2016, LNCS","author":"F Courbon","year":"2017","unstructured":"Courbon F, Skorobogatov S, Woods C (2017) Reverse engineering Flash EEPROM memories using scanning electron microscopy. CARDIS 2016, LNCS, vol 10146. Springer, Berlin"},{"key":"50_CR24","unstructured":"MC68HC908AZ60 HCMOS microcontroller unit, Freescale Semiconductor Inc. \n                    http:\/\/www.freescale.com\/files\/microcontrollers\/doc\/data_sheet\/MC68HC908AZ60.pdf"},{"key":"50_CR25","unstructured":"MC68HC908AZ60A microcontroller, Freescale Semiconductor Inc. \n                    http:\/\/cache.freescale.com\/files\/microcontrollers\/doc\/data_sheet\/MC68HC908AZ60A.pdf"},{"key":"50_CR26","unstructured":"MSP430F112 ultra-low-power microcontroller, Texas Instruments. \n                    http:\/\/www.ti.com\/product\/msp430f112"},{"key":"50_CR27","unstructured":"MSP430F427 ultra-low-power microcontroller, Texas Instruments. \n                    http:\/\/www.ti.com\/product\/msp430f427"},{"key":"50_CR28","unstructured":"PIC16F87X data sheet. 28\/40-pin 8-bit CMOS FLASH microcontrollers, Microchip"},{"key":"50_CR29","unstructured":"Atmega163, Atmel. \n                    http:\/\/www.atmel.com\/devices\/atmega163.aspx6"},{"key":"50_CR30","unstructured":"Attiny12, Atmel. \n                    http:\/\/www.atmel.com\/devices\/attiny12.aspx"},{"key":"50_CR31","doi-asserted-by":"crossref","unstructured":"Skorobogatov S, Woods C Breakthrough silicon scanning discovers backdoor in military chip. CHES 2012, LNCS 7428, pp 23\u201340","DOI":"10.1007\/978-3-642-33027-8_2"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0050-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0050-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0050-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T19:11:53Z","timestamp":1570734713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0050-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["50"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0050-5","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"9 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}