{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:21:53Z","timestamp":1730215313044,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/dtis.2018.8368582","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:25:11Z","timestamp":1527805511000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Give me your binary, I'll tell you if it leaks"],"prefix":"10.1109","author":[{"given":"Antoine","family":"Bouvet","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Bruneau","sequence":"additional","affiliation":[]},{"given":"Adrien","family":"Facon","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"187","article-title":"High-Resolution Side-Chansnel Attack Using Phase-Based Waveform Matching","volume":"4249","author":"homma","year":"2006","journal-title":"CHES Ser LNCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.119"},{"key":"ref6","article-title":"NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage","author":"bhasin","year":"2014","journal-title":"International Symposium on Electromagnetic Compatibility (EMC &#x2019;14\/Tokyo) IEEE"},{"journal-title":"Debugging with gdb The gnu Source-Level Debugger Ninth Edition for gdb version 20040217","year":"2012","author":"stallman","key":"ref5"},{"journal-title":"White-box Cryptography","year":"2008","author":"preneel","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_45"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_20"},{"key":"ref9","article-title":"197: Advanced encryption standard (AES)","volume":"197","year":"2001","journal-title":"Federal Information Processing Standards Publication"}],"event":{"name":"2018 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","start":{"date-parts":[[2018,4,9]]},"location":"Taormina","end":{"date-parts":[[2018,4,12]]}},"container-title":["2018 13th International Conference on Design &amp; Technology of Integrated Systems In Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362838\/8368541\/08368582.pdf?arnumber=8368582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T23:33:59Z","timestamp":1529364839000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dtis.2018.8368582","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}