{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:51:57Z","timestamp":1767772317252},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iccad45719.2019.8942084","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:44:25Z","timestamp":1578012265000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory"],"prefix":"10.1109","author":[{"given":"Wei-Chen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ping-Hsien","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yung-Chun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chien-Chung","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Yu-Ming","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yuan-Hao","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2011","journal-title":"SNIA IOTTA Repository","key":"ref1"},{"volume-title":"Flash File System","year":"1995","author":"Ban","key":"ref2"},{"key":"ref3","first-page":"106","article-title":"Adding Secure Deletion to an Encrypted File System on Android Smartphones","volume-title":"Proc. SECURWARE","author":"Braga","year":"2014"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCAD.2013.6691152"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2968456.2968462"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2420950.2421013"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1508244.1508271"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/NVMSA.2018.00019"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3133956.3134011"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1063\/1.1897431"},{"key":"ref11","first-page":"27","article-title":"An Efficient Secure Deletion Scheme for Flash File Systems","author":"Lee","year":"2010","journal-title":"Journal of Information Science and Engineering"},{"key":"ref12","first-page":"264","article-title":"Effects of Floating-gate Interference on NAND Flash Memory Cell Operation","author":"Lee","year":"2002","journal-title":"IEEE Electron Device Letters"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1275986.1275990"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3240765.3240773"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1515\/popets-2017-0009"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/IEDM.2015.7409617"},{"key":"ref17","article-title":"Study of Incremental Step Pulse Programming (ISPP) and STI Edge Effect of BE-SONOS NAND Flash","volume-title":"2008 IEEE International Reliability Physics Symposium","author":"Lue","year":"2008"},{"volume-title":"Error Correction Codes for Non-Volatile Memories","year":"2010","author":"Micheloni","key":"ref18"},{"volume-title":"TEMPEST attacks against AES","year":"2017","author":"Ramsay","key":"ref19"},{"key":"ref20","first-page":"333","article-title":"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Reardon","year":"2012"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2414456.2414493"},{"key":"ref22","article-title":"When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography","volume-title":"NDSS","author":"Ristenpart","year":"2010"},{"year":"2011","journal-title":"Data Sheet","article-title":"24nm 64gb ex3 (8lc) 3v nand flash memory data sheet","key":"ref23"},{"volume-title":"Flash Memory Card with Block Memory Address Arrangement","year":"1999","author":"Shinohara","key":"ref24"},{"key":"ref25","article-title":"On the Use of Strong BCH Codes for Improving Multilevel NAND Flash Memory Storage Capacity","volume-title":"IEEE Workshop on Signal Processing Systems (SiPS): Design and Implementation","author":"Sun","year":"2006"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/1367829.1367831"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TCAD.2018.2857260"},{"key":"ref28","first-page":"8","article-title":"Reliably Erasing Data from Flash-based Solid State Drives","volume-title":"Proceedings of the 9th USENIX Conference on File and Stroage Technologies, FAST\u201911","author":"Wei","year":"2011"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1233501.1233624"}],"event":{"name":"2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","start":{"date-parts":[[2019,11,4]]},"location":"Westminster, CO, USA","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8931666\/8942037\/08942084.pdf?arnumber=8942084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T23:52:52Z","timestamp":1706053972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8942084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iccad45719.2019.8942084","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}