{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T05:10:16Z","timestamp":1756357816274,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,6]]},"DOI":"10.1109\/isvlsi65124.2025.11130208","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:15Z","timestamp":1756318815000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning Fault Injection Detection in Clock Signals: An Analysis of Frequency Impact"],"prefix":"10.1109","author":[{"given":"Asier","family":"Gambra","sequence":"first","affiliation":[{"name":"Radboud University"}]},{"given":"Unai","family":"Rioja","sequence":"additional","affiliation":[{"name":"Ikerlan Technology Research Centre"}]},{"given":"Durba","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Radboud University"}]},{"given":"Igor","family":"Armendariz","sequence":"additional","affiliation":[{"name":"Ikerlan Technology Research Centre"}]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[{"name":"Radboud University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"ref4","article-title":"Advanced Encryption Standard (AES)","volume-title":"U.S. Department of Commerce, Tech. Rep. FIPS PUB","volume":"197","year":"2001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"ref6","article-title":"Attacking Hardware AES with DFA","volume":"abs\/1902.08693","author":"Lu","year":"2019","journal-title":"ArXiv"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC60478.2023.00014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i1.157-179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref14","article-title":"Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data","author":"Gambra","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859734"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3623652.3623671"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.k.200326.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"ref19","article-title":"Multi-Scale Context Aggregation by Dilated Convolutions","volume":"abs\/1511.07122","author":"Yu","year":"2015","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2018.00014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC57191.2022.00012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90553-8_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104638"},{"key":"ref24","article-title":"STM32 Nucleo-64 Development Board with STM32F410RB MCU"},{"key":"ref25","article-title":"Inspector FI"},{"journal-title":"Kokke","article-title":"Tiny AES in C - small portable AES implementation","year":"2019","key":"ref26"}],"event":{"name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","start":{"date-parts":[[2025,7,6]]},"location":"Kalamata, Greece","end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129697\/11130193\/11130208.pdf?arnumber=11130208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T04:30:58Z","timestamp":1756355458000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isvlsi65124.2025.11130208","relation":{},"subject":[],"published":{"date-parts":[[2025,7,6]]}}}