{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:08:53Z","timestamp":1771708133865,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133318","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"227-237","source":"Crossref","is-referenced-by-count":10,"title":["Disassembling Software Instruction Types through Impedance Side-channel Analysis"],"prefix":"10.1109","author":[{"given":"Md Sadik","family":"Awal","sequence":"first","affiliation":[{"name":"Florida International University,ECE Department,Miami,Florida,USA"}]},{"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Florida International University,ECE Department,Miami,Florida,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0639"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300127"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2906547"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_11"},{"key":"ref10","article-title":"Side-channel attacks: Ten years after its pub-lication and the impacts on cryptographic module security testing","author":"zhou","year":"2005","journal-title":"Cryptology ePrint Archive"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3190236"},{"key":"ref46","author":"jackson","year":"2005","journal-title":"A User's Guide to Principal Components"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2022.3196662"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3061314"},{"key":"ref42","article-title":"Arduino Uno Rev3 product page","year":"2023"},{"key":"ref41","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref44","first-page":"133","article-title":"Analytical pdn voltage ripple calculation using sim-plified equivalent circuit model of pcb pdn","author":"zhao","year":"0","journal-title":"in 2015 IEEE Symposium on Electromagnetic Compatibility and Signal Integrity"},{"key":"ref43","first-page":"281","article-title":"Atmega328p specificatio datasheet","year":"23"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636099"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2540634"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6572-6"},{"key":"ref3","article-title":"A comprehensive IoT attacks survey based on a building-blocked reference model","volume":"9","author":"abdul-ghani","year":"2018","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054999"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETS48528.2020.9131596"},{"key":"ref40","author":"marsland","year":"2011","journal-title":"Machine Learning An Algorithmic Perspective"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3092627.3092633"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_17"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2018.2887243","article-title":"Side-channel-based code-execution monitoring sys-tems: a survey","volume":"36","author":"han","year":"2019","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"ref30","author":"ballo","year":"1997","journal-title":"Network analyzer basics Hewlett-Packard Company Mi-crowave Instruments Division"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0129-2"},{"key":"ref32","article-title":"WattsUpDoc: Power side channels to nonin-trusively discover untargeted malware on embedded medical devices","volume":"13","author":"clark","year":"2013","journal-title":"in USENIX Workshop on HealthTech"},{"key":"ref2","article-title":"Mmd-0056-2016-linux\/mirai, how an old elf malcode is recycled","year":"2023","journal-title":"Malware Must Die!"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920763"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/9781119477167"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","article-title":"The em side---channel(s)","author":"agrawal","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002"},{"key":"ref23","article-title":"Profiled deep learning side-channel attack on a protected arbiter puf combined with bitstream modification","author":"yu","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE56030.2022.10014924"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-020-00093-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00074-w"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384727"},{"key":"ref28","author":"smith","year":"2004","journal-title":"Microelectronic Circuits"},{"key":"ref27","article-title":"Digital Integrated Circuits","author":"rabaey","year":"2002","journal-title":"Prentice Hall"},{"key":"ref29","author":"wolf","year":"2004","journal-title":"FPGA-Based System Design"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"San Jose, CA, USA","start":{"date-parts":[[2023,5,1]]},"end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133318.pdf?arnumber=10133318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:45:49Z","timestamp":1687196749000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133318","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}