{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:29:31Z","timestamp":1730273371837,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/isdfs55398.2022.9800753","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T15:52:11Z","timestamp":1655913131000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["\u2018Unified Side-Channel Attack - Model\u2019 (USCA-M): An Extension with Biometrics Side-Channel Type"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Johnson","sequence":"first","affiliation":[{"name":"University of South Wales,Faculty of Computing, Engineering, and Mathematics,Pontypridd,Wales"}]},{"given":"Richard","family":"Ward","sequence":"additional","affiliation":[{"name":"University of South Wales,Faculty of Computing, Engineering, and Mathematics,Pontypridd,Wales"}]}],"member":"263","reference":[{"key":"ref10","article-title":"One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation","author":"xiao","year":"2016","journal-title":"25th USENIX Security Symposium USENIX Security 16"},{"key":"ref11","first-page":"104-","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"Crypto"},{"key":"ref12","first-page":"1","article-title":"Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing","author":"zhou","year":"2005","journal-title":"Inf Secur Semin WS 0607"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMST.2017.2779824"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s41635-018-0046-1"},{"key":"ref15","first-page":"33","article-title":"A Survey of Side-Channel Attacks on Caches and Countermeasures","author":"lyu","year":"2017","journal-title":"J Hardw Syst Secur"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIFS.2019.2934867"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JBHI.2017.2691282"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.inffus.2021.10.004"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.cose.2020.101902"},{"year":"2018","author":"strom","article-title":"MITRE ATT&CK - Design and Philosophy","key":"ref28"},{"key":"ref4","article-title":"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution","author":"van bulck","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ISPASS48437.2020.00014"},{"key":"ref3","article-title":"Meltdown: Reading Kernel Memory from User Space","author":"lipp","year":"2018","journal-title":"In 27th USENIX Secur Symp (USENIX Secur 18)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/FCCM.2018.00016"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SP.2018.00049"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP.2018.00031"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.26599\/TST.2018.9010047"},{"key":"ref2","article-title":"Spectre Attacks: Exploiting Speculative Execution","author":"kocher","year":"2018","journal-title":"40th IEEE Symp Secur Priv"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/HST.2016.7495576"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ISDFS49300.2020.9116291"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/IWBF.2018.8401565"},{"year":"2022","article-title":"Biometric ID","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICPR.2010.303"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/BTAS.2015.7358783"},{"year":"2018","article-title":"Voice Identification Privacy Notice","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/SP.2019.00087"},{"key":"ref25","first-page":"44","article-title":"Side channel analysis on biometric-based key generation algorithms on resource constrained devices","volume":"3","author":"delivasilis","year":"2006","journal-title":"Int J Netw Secur"}],"event":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2022,6,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,6,7]]}},"container-title":["2022 10th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9800750\/9800752\/09800753.pdf?arnumber=9800753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T13:57:44Z","timestamp":1686578264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isdfs55398.2022.9800753","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}