{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:01:53Z","timestamp":1730224913165,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133316","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"89-99","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core"],"prefix":"10.1109","author":[{"given":"Th\u00e9ophile","family":"Gousselot","sequence":"first","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP,Gardanne France,F-13541"}]},{"given":"Olivier","family":"Thomas","sequence":"additional","affiliation":[{"name":"Texplained"}]},{"given":"Jean-Max","family":"Dutertre","sequence":"additional","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP,Gardanne France,F-13541"}]},{"given":"Olivier","family":"Potin","sequence":"additional","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP,Gardanne France,F-13541"}]},{"given":"Jean-Baptiste","family":"Rigaud","sequence":"additional","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP,Gardanne France,F-13541"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/16522354.2005.11073431"},{"journal-title":"Apex Microelectronics","article-title":"Compatible ink cartridges selling by Apex Microelectronics","year":"2022","key":"ref3"},{"key":"ref4","article-title":"Semi-invasive attacks: a new approach to hardware security analysis","author":"Skorobogatov","year":"2005","journal-title":"University of Cambridge"},{"key":"ref5","first-page":"9","article-title":"Design Principles for Tamper-Resistant Smartcard Processors","volume-title":"Smartcard","volume":"99","author":"K\u00f6mmerling"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516717"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2762630"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601067"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862423"},{"key":"ref11","first-page":"171","article-title":"Breaking all the things -A systematic survey of firmware extraction techniques for IoT devices","volume-title":"in International Conference on Smart Card Research and Advanced Applications","author":"Vasile"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.199-224"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.31399\/asm.tb.mfadr7.t91110379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.fopow.2022.11.032"},{"key":"ref15","first-page":"48","article-title":"Rivals say HP is using hardball tactics","author":"Hamm","year":"2007","journal-title":"Business Week"},{"journal-title":"G&G & Ninestar Corporation","year":"2019","author":"Distribution","key":"ref16"},{"key":"ref17","first-page":"213","article-title":"Prudential Standing Doctrine Abolished or Waiting for a Comeback: Lexmark International, Inc. v. Static Control Components, Inc","volume":"18","author":"Mank","year":"2015","journal-title":"U. Pa. J. Const. L."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1147\/sj.302.0206"},{"key":"ref19","first-page":"1","article-title":"Tamper resistance-a cautionary note","volume-title":"in Proceedings of the second Usenix workshop on electronic commerce","volume":"2","author":"Anderson"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2017.69"},{"journal-title":"OpenHW Group","article-title":"CV32E40P RISC-V IP","year":"2022","key":"ref21"},{"journal-title":"OpenHW Group","article-title":"CORE-V-VERIF: Functional verification project","year":"2022","key":"ref22"},{"journal-title":"Veripool","article-title":"Fast and open-source Verilog\/SystemVerilog simulator","year":"2022","key":"ref23"},{"key":"ref24","first-page":"1","article-title":"IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language","year":"2018","journal-title":"IEEE Std 1800-2017 (Revision of IEEE Std 1800-2012)"},{"journal-title":"Embench","article-title":"Embench: Open Benchmarks for Embedded Platforms","year":"2022","key":"ref25"},{"journal-title":"OpenHW Group","article-title":"CORE-V-MCU: microcontroller","year":"2022","key":"ref26"},{"key":"ref27","article-title":"The RISC-V Instruction Set Manual","volume":"I","author":"Waterman","year":"2019","journal-title":"User-Level ISA, Document Version 20191213"},{"journal-title":"ARM","article-title":"Arm Architecture Reference Manual Armv8, for Armv8-A architecture profile","year":"2019","key":"ref28"},{"key":"ref29","article-title":"Low-cost chip microprobing","author":"Maier","year":"2012","journal-title":"29th Chaos Communication Congress (29C3)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2584041"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133316.pdf?arnumber=10133316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T16:09:03Z","timestamp":1721837343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133316","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}