{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:18:56Z","timestamp":1760098736291,"version":"3.37.3"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133626","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"80-88","source":"Crossref","is-referenced-by-count":6,"title":["Advanced Covert-Channels in Modern SoCs"],"prefix":"10.1109","author":[{"given":"Lilian","family":"Bossuet","sequence":"first","affiliation":[{"name":"Univ Lyon, UJM-Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516,SAINT-ETIENNE,France,F-42023"}]},{"given":"Carlos Andres","family":"Lara-Nino","sequence":"additional","affiliation":[{"name":"Univ Lyon, UJM-Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516,SAINT-ETIENNE,France,F-42023"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225851"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2018.8618038"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3322483"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3460229"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2857038"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.3211123"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.209"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2629639"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2133352.2133353"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42068-0_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994789"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89915-8_1"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133626.pdf?arnumber=10133626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T06:05:10Z","timestamp":1709273110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133626","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}