{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:54:45Z","timestamp":1761630885793,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/hpec.2019.8916486","type":"proceedings-article","created":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T12:11:36Z","timestamp":1575029496000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["A Survey on Hardware Security Techniques Targeting Low-Power SoC Designs"],"prefix":"10.1109","author":[{"given":"Alan","family":"Ehret","sequence":"first","affiliation":[]},{"given":"Karen","family":"Gettings","sequence":"additional","affiliation":[]},{"given":"Bruce R.","family":"Jordan","sequence":"additional","affiliation":[]},{"given":"Michel A.","family":"Kinsy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581579"},{"key":"ref34","article-title":"Robust fuzzy extractors and helper data manipulation attacks revisited: Theory vs practice","author":"becker","year":"2017","journal-title":"Cryptology EPrint Archive Report 2010\/499"},{"key":"ref28","article-title":"Combined modeling and side channel attacks on strong PUFs","author":"mahmoud","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"ref29","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"uhrmair","year":"2010","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security CCS &#x2019;10"},{"key":"ref2","article-title":"Security technology building a secure system using trustzone technology (white paper)","author":"arm","year":"2009","journal-title":"ARM Limited"},{"journal-title":"ios Security","year":"0","key":"ref1"},{"journal-title":"Introduction to Hardware Security and Trust","year":"2011","author":"tehranipoor","key":"ref20"},{"key":"ref22","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RFID tags","author":"holcomb","year":"2007","journal-title":"Proceedings of the Conference on RFID Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"24902","DOI":"10.1063\/1.2209532","article-title":"Information-theoretic analysis of capacitive physical unclonable functions","volume":"100","author":"skoric","year":"2006","journal-title":"Journal of Applied Physics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2007.4341520"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485972"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2030012"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951731"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763291"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2011.17"},{"key":"ref10","first-page":"266","article-title":"Compilation techniques for efficient encrypted computation","volume":"2012","author":"fletcher","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref11","article-title":"Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation","author":"kinsy","year":"2018","journal-title":"Boston Area Architecture 2018 Workshop (BARC18)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.101"},{"key":"ref12","article-title":"An anti-counterfeiting concept for currency systems","author":"bauder","year":"1983","journal-title":"Research report PTK-11990 Sandia National Labs"},{"key":"ref13","first-page":"372","article-title":"Ic identification circuit using device mismatch. In 2000 IEEE International Solid-State Circuits Conference","author":"lofstrom","year":"2000","journal-title":"Digest of Technical Papers (Cat No 00CH37056)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"journal-title":"NXP Strengthens SmartMX2 Security Chips with PUF Anti-cloning Technology","year":"0","key":"ref15"},{"key":"ref16","article-title":"NXP Strengthens SmartMX2 Security Chips with PUF Anti-Cloning Technology","author":"times","year":"2010","journal-title":"UBM Tech Electronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284683"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","article-title":"The sorcerer&#x2019;s apprentice guide to fault attacks","volume":"94","author":"bar-el","year":"2006","journal-title":"Proceedings of the IEEE"},{"key":"ref3","article-title":"Intel trusted execution technology","author":"greene","year":"2012","journal-title":"Intel White Paper"},{"key":"ref6","article-title":"Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures&#x2013;a survey","volume":"130","author":"hess","year":"2000","journal-title":"Eurosmart Security Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28368-0_18"},{"key":"ref8","article-title":"Meltdown","volume":"abs 1801 1207","author":"lipp","year":"2018","journal-title":"CoRR"},{"key":"ref7","article-title":"Spectre attacks: Exploiting speculative execution","volume":"abs 1801 1203","author":"kocher","year":"2018","journal-title":"CoRR"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2200\/S00209ED1V01Y200907CAC008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"ref46","first-page":"1","article-title":"Self-encrypting disks pose self-decrypting risks","author":"muller","year":"2012","journal-title":"the 29th Chaos Communinication Congress"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053051"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080226"},{"key":"ref42","article-title":"Amd memory encryption","author":"kaplan","year":"2016","journal-title":"White Paper"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"}],"event":{"name":"2019 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2019,9,24]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2019,9,26]]}},"container-title":["2019 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910148\/8916214\/08916486.pdf?arnumber=8916486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:47:01Z","timestamp":1658155621000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8916486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/hpec.2019.8916486","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}