{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:19:38Z","timestamp":1730276378842,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424292","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"522-528","source":"Crossref","is-referenced-by-count":0,"title":["SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion"],"prefix":"10.1109","author":[{"given":"Arijit","family":"Nath","sequence":"first","affiliation":[]},{"given":"Manik B.","family":"Bhosle","sequence":"additional","affiliation":[]},{"given":"Hemangee K.","family":"Kapoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/MCSoC.2017.12"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ARES.2015.28"},{"key":"ref10","first-page":"137","article-title":"Reijndael: The advanced encryption standard","volume":"26","author":"daemen","year":"2001","journal-title":"Dr Dobb's Software Tools for the Professional Programmer"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2024716.2024718"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ISVLSI.2012.82"},{"key":"ref13","first-page":"788","article-title":"A study on the challenges and prospects of PCM Based Main Memory Architectures","volume":"18","author":"rajarajan","year":"2013","journal-title":"Middle-East Journal of Scientific Research"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1555754.1555758"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2487726.2488368"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/3-540-61996-8_49"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1352592.1352625"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s00034-013-9568-5"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2897937.2898087"},{"key":"ref28","article-title":"An off-chip attack on hardware enclaves via the memory bus","author":"lee","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2786763.2694387"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ISCA.2005.30"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3370748.3406559"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3106340"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ARES.2013.52"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MICRO.2018.00043"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.23919\/DATE.2017.7927151"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2897937.2898110"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/DAC.2018.8465906"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3380732"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/IGCC.2011.6008569"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TC.2016.2642180"},{"key":"ref22","article-title":"Cache bypassing and checkpointing to circumvent data security attacks on sttram","author":"motaman","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2966986.2980064"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ISED.2011.17"},{"key":"ref23","first-page":"348","article-title":"Data privacy in nonvolatile cache: Challenges, attack models and solutions","author":"rathi","year":"2016","journal-title":"ASP-DAC2016"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/1186736.1186737"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2593069.2593144"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2021,4,7]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424292.pdf?arnumber=9424292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:22Z","timestamp":1652197282000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424292","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}