{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:25:21Z","timestamp":1725769521153},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NCR009-000l"],"award-info":[{"award-number":["NRF2018NCR-NCR009-000l"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545381","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"12-20","source":"Crossref","is-referenced-by-count":0,"title":["A Security Assessment of Protected Execute-Only Firmware in Microcontrollers Through Selective Chemical Engraving"],"prefix":"10.1109","author":[{"given":"Xiaomei","family":"Zeng","sequence":"first","affiliation":[{"name":"Nanyang Technological University,Singapore"}]},{"given":"Liu","family":"Qing","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}]},{"given":"Samuel","family":"Chef","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}]},{"given":"Chee Lip","family":"Gan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}]}],"member":"263","reference":[{"volume-title":"Embedded flash memory for embedded systems: technology, design for sub-systems, and innovations","year":"2017","author":"Hidaka","key":"ref1"},{"key":"ref2","first-page":"1","article-title":"Shedding too much light on a microcontrollers firmware protection","volume-title":"11th USENIX Workshop on Offensive Technologies","author":"Obermaier","year":"2017"},{"key":"ref3","first-page":"1","article-title":"Taking a look into execute-only memory","volume-title":"13th USENIX Conference on Offensive Technologies","author":"Schink","year":"2019"},{"key":"ref4","first-page":"1109","article-title":"PEARL: plausibly deniable flash translation layer using WOM coding","volume-title":"the Proceedings of the 30th USENIX Security Symposium","author":"Chen","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0016-z"},{"key":"ref6","first-page":"301","volume-title":"Automated profiling method for laser fault injection in FPGAs,\u201d in \u201cAutomated methods in cryptographic fault analysis","author":"Breier","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2016p0327"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6528\/ac1ebd"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1557\/opl.2013.416"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3172222"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327857"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA58228.2023.10249184"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2021.114196"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2018.8631555"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1149\/1.2119787"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/wics.164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-023-00335-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/A-SSCC47793.2019.9056950"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3073946"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855563"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2018.00081"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ipfa55383.2022.9915714"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC57191.2022.00010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU52992.2021.9598995"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.573-595"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331672"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-0372-5"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545381.pdf?arnumber=10545381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:17:47Z","timestamp":1717906667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545381","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}