{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T04:33:04Z","timestamp":1761971584253,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/dft.2012.6378198","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:51:04Z","timestamp":1355867464000},"page":"49-54","source":"Crossref","is-referenced-by-count":6,"title":["#SAT-based vulnerability analysis of security components &amp;#x2014; A case study"],"prefix":"10.1109","author":[{"given":"Linus","family":"Feiten","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Schubert","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Czutro","sequence":"additional","affiliation":[]},{"given":"Eberhard","family":"Bohl","sequence":"additional","affiliation":[]},{"given":"Ilia","family":"Polian","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Becker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"54","article-title":"Model counting: A new strategy for obtaining good bounds","author":"gomes","year":"2006","journal-title":"Proceedings of the 21st National Conference on Artificial Intelligence AAAI'06"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"18","first-page":"1173","article-title":"Performing incremental bayesian inference by dynamic model counting","author":"li","year":"2006","journal-title":"Proceedings of the 21st National Conference on Artificial Intelligence AAAI'06"},{"journal-title":"Lingeling Plingeling PicoSAT and PrecoSAT at SAT Race 2010","year":"2010","author":"biere","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/321033.321034"},{"key":"13","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1007\/978-3-540-24605-3_37","article-title":"An extensible SAT-solver","volume":"2919","author":"ee?n","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"14","first-page":"399","article-title":"Predicting learnt clauses quality in modern SAT solvers","author":"audemard","year":"2009","journal-title":"IJCAI"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2011.5993840"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2012.6313851"},{"key":"21","first-page":"70","article-title":"A model counting characterization of diagnoses","author":"kumar","year":"2002","journal-title":"Proceedings of the 13th International Workshop on Principles of Diagnosis"},{"key":"20","first-page":"565","article-title":"Probabilistic planning via heuristic forward search and weighted model counting","volume":"30","author":"domshlak","year":"2007","journal-title":"J Artif Int Res"},{"key":"22","article-title":"Antom - Solver Description","author":"schubert","year":"2010","journal-title":"SAT Race"},{"key":"23","article-title":"Combining component caching and clause learning for effective model counting","author":"sang","year":"0","journal-title":"Seventh International Conference on Theory and Applications of Satisfiability Testing 2004"},{"key":"24","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/11814948_38","article-title":"Sharpsat - Counting models with advanced component caching and implicit BCP","volume":"4121","author":"thurley","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-009-0124-7"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231098"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.186"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560193"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560197"},{"key":"3","first-page":"473","article-title":"Covert and side channels due to processor architecture","author":"wang","year":"2006","journal-title":"Comp Security Applications Conf"},{"key":"2","first-page":"29","article-title":"The em side-channel(s)","volume":"2523","author":"agrawal","year":"2003","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311880"},{"key":"1","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"LNCS"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2009.5195983"},{"key":"7","article-title":"Improved differential fault analysis of Trivium","author":"mohamed","year":"2011","journal-title":"COSADE"},{"key":"6","first-page":"224","article-title":"Differential fault analysis of the advanced encryption standard using a single fault","volume":"6633","author":"tunstall","year":"2011","journal-title":"LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72354-7_18"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"journal-title":"Fault-Tolerant Systems","year":"2007","author":"koren","key":"9"},{"key":"8","article-title":"A fault attack on the LED block cipher","author":"jovanovic","year":"2012","journal-title":"COSADE"}],"event":{"name":"2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","start":{"date-parts":[[2012,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2012,10,5]]}},"container-title":["2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362314\/6378188\/06378198.pdf?arnumber=6378198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:23:11Z","timestamp":1498018991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dft.2012.6378198","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}