{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:15:53Z","timestamp":1730272553240,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,19]]},"DOI":"10.1109\/iscas58744.2024.10558524","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:22:52Z","timestamp":1719940972000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Explainable automated data estimation in Logic State Imaging of embedded SRAM"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Chef","sequence":"first","affiliation":[{"name":"Nanyang Technological University,Temasek Laboratories@NTU,Singapore"}]},{"given":"Chung Tah","family":"Chua","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Temasek Laboratories@NTU,Singapore"}]},{"given":"Jing","family":"Yun Tay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Temasek Laboratories@NTU,Singapore"}]},{"given":"Chee Lip","family":"Gan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Temasek Laboratories@NTU,Singapore"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Semi-Invasive Analysis attacks \u2013 A new approach to hardware security analysis","volume-title":"PhD Dissertation Thesis","author":"Skorobogatov","year":"2005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.31399\/asm.tb.mfadr7.t91110180"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.31399\/asm.tb.mfadr7.t91110196"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.31399\/asm.tb.mfadr7.t91110244"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_3"},{"issue":"3","key":"ref6","first-page":"573","article-title":"Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs","volume-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems","volume":"2018","author":"Lohrke","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ipfa.2018.8452604"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/fdtc57191.2022.00010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2018p0266"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2018.8383889"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2021p0154"},{"key":"ref14","first-page":"1803","article-title":"The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series FPGAs","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium (SEC20)","author":"Ender"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2021.3105697"},{"key":"ref16","first-page":"627","article-title":"Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks","volume-title":"30th USENIX Conference on Security Symposium (SEC 21)","author":"Krachenfels"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2014p0065"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tdmr.2007.900056"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ipfa.2006.250981"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ipfa.2009.5232707"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"journal-title":"DS190: Zynq 7000 SoC Datasheet: overview","year":"2018","key":"ref22"},{"volume-title":"Picozed 7030 SOM \u2013 Zynq SoC based, AES-Z7PZ-7Z030-SOM-I-G","key":"ref23"},{"volume-title":"PicoZed FMC Carrier Card V2 Kit, AES-PZCC-FMC-V2-G","key":"ref24"},{"volume-title":"Stanford Research Systems, SR570 \u2014 Low noise current preamplifier","key":"ref25"},{"volume-title":"SEMICAPS SOM 1100","key":"ref26"},{"volume-title":"Statistics and Machine Learning Toolbox","key":"ref27"},{"key":"ref28","first-page":"281","article-title":"Some Methods for Classification and Analysis of Multivariate Observation","volume-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability","volume":"1","author":"MacQueen"}],"event":{"name":"2024 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2024,5,19]]},"location":"Singapore, Singapore","end":{"date-parts":[[2024,5,22]]}},"container-title":["2024 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10557746\/10557828\/10558524.pdf?arnumber=10558524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T06:13:50Z","timestamp":1719987230000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10558524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,19]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iscas58744.2024.10558524","relation":{},"subject":[],"published":{"date-parts":[[2024,5,19]]}}}