{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:12:18Z","timestamp":1771330338750,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/hst.2015.7140238","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T21:21:33Z","timestamp":1436217693000},"page":"62-67","source":"Crossref","is-referenced-by-count":66,"title":["High precision fault injections on the instruction cache of ARMv7-M architectures"],"prefix":"10.1109","author":[{"given":"Lionel","family":"Riviere","sequence":"first","affiliation":[]},{"given":"Zakaria","family":"Najm","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Rauzy","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Bringer","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Sauvage","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-27257-8_5","article-title":"Combined fault and side-channel attack on protected implementations of aes","author":"roche","year":"2011","journal-title":"The 8th IFIP WG 8 8\/11 2 International Conference on Smart Card Research and Advanced Applications"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-642-40026-1_2","article-title":"Electromagnetic glitch on the aes round counter","author":"dehbaoui","year":"2013","journal-title":"Constructive Side-Channel Analysis and Secure Design"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.17"},{"key":"ref13","article-title":"Benjamin Gr&#x00E9;goire and Jean-Christophe Zapalowicz. Synthesis of fault attacks on cryptographic implementations","author":"barthe","year":"2014","journal-title":"IACR Cryptology EPrint Archive 2014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0077-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.07.020"},{"key":"ref3","first-page":"37","article-title":"Lipton. On the Importance of Checking Cryptographic Protocols for Faults","author":"dan","year":"1997","journal-title":"Proceedings of Eurocrypt'97 Volume 1233 of LNCS"},{"key":"ref6","article-title":"Low Voltage Fault Attacks to AE S","author":"barenghi","year":"2010","journal-title":"HOST (Hardware Oriented Security and Trust) IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855580"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_16"},{"key":"ref2","first-page":"388","article-title":"Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael J. Wiener, editor","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science 1666 CRYPTO"},{"key":"ref1","article-title":"Common Criteria Consortium","year":"2013","journal-title":"Common Criteria (aka CC) for Information Technology Security Evaluation (ISO\/IEC 15408)"},{"key":"ref9","first-page":"949","article-title":"Magnetic microprobe design for em fault attack","author":"omarouayache","year":"2013","journal-title":"International Symposium on Electromagnetic Compatibility (EMC EUROPE)"}],"event":{"name":"2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Washington, DC, USA","start":{"date-parts":[[2015,5,5]]},"end":{"date-parts":[[2015,5,7]]}},"container-title":["2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7119893\/7140225\/07140238.pdf?arnumber=7140238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:12:18Z","timestamp":1498230738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/hst.2015.7140238","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}