{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:56:39Z","timestamp":1767084999499,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation and the Cyber Security Agency","doi-asserted-by":"publisher","award":["NRF2018NCR-NCR002-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR002-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Solid-State Circuits"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/jssc.2023.3274596","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:53:32Z","timestamp":1685037212000},"page":"2919-2930","source":"Crossref","is-referenced-by-count":6,"title":["Laser Voltage Probing Attack Detection With 100% Area\/Time Coverage at Above\/Below the Bandgap Wavelength and Fully-Automated Design"],"prefix":"10.1109","volume":"58","author":[{"given":"Hui","family":"Zhang","sequence":"first","affiliation":[{"name":"ECE Department, National University of Singapore, Queenstown, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4702-737X","authenticated-orcid":false,"given":"Longyang","family":"Lin","sequence":"additional","affiliation":[{"name":"ECE Department, National University of Singapore, Queenstown, Singapore"}]},{"given":"Qiang","family":"Fang","sequence":"additional","affiliation":[{"name":"ECE Department, National University of Singapore, Queenstown, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-8258","authenticated-orcid":false,"given":"Massimo","family":"Alioto","sequence":"additional","affiliation":[{"name":"ECE Department, National University of Singapore, Queenstown, Singapore"}]}],"member":"263","reference":[{"year":"2021","author":"amini","article-title":"A structure for protection of security-sensitive ICs against attacks through silicon backside","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/IPFA.2016.7564318"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IOLTS.2017.8046216"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ISQED54688.2022.9806217"},{"year":"2012","author":"zachariasse","journal-title":"Semiconductor device with backside tamper protection","key":"ref11"},{"key":"ref10","first-page":"1","article-title":"Backside polishing detector: A new protection against backside attacks","author":"manich","year":"2015","journal-title":"Proc Conf Design Circuits Integr Syst (DCIS)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3446998"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TCSI.2017.2695228"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1364\/JOSAA.29.002350"},{"year":"0","journal-title":"SEMI website","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1007\/978-3-540-45146-4_27"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/ISSCC42615.2023.10067715"},{"key":"ref46","first-page":"413","article-title":"Provably secure higher-order masking of AES","author":"matthieu","year":"2010","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/JSSC.2022.3230372"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.46586\/tches.v2022.i4.463-489"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.46586\/tches.v2018.i3.573-595"},{"year":"2009","author":"saha","article-title":"A diagonal fault attack on the advanced encryption standard","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-540-45238-6_7"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/ISSCC42614.2022.9731739"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/978-3-642-29656-7"},{"year":"2006","author":"okuda","journal-title":"IC card system using photo-detectors for protection","key":"ref49"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.31399\/asm.cp.istfa2018p0280"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s41635-018-0052-3"},{"year":"2006","author":"k\u00f6mmerling","journal-title":"Anti Tamper Encapsulation for An Integrated Circuit","key":"ref9"},{"key":"ref4","first-page":"543","article-title":"Computer systems under attack&#x2013;paying the performance price for protection","author":"alioto","year":"2022","journal-title":"IEEE Int Solid-State Circuits Conf (ISSCC) Dig Tech Papers"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-030-64448-2"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/FDTC.2013.13"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TDMR.2007.898074"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TIFS.2011.2174984"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.31399\/asm.cp.istfa2022p0144"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TEST.2001.966660"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ISSCC.2011.5746316"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/JSSC.2018.2869142"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.microrel.2008.07.040"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-3-540-45203-4_23"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ATS.2001.990279"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.microrel.2016.07.054"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ISSCC.2015.7063109"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MSSC.2019.2923503"},{"year":"2013","author":"proakis","journal-title":"Digital Signal Processing","key":"ref39"},{"year":"2005","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3526241.3530053"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TVLSI.2021.3073946"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/IOLTS.2010.5560194"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/FDTC.2018.00009"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/VLSITechnologyandCir46769.2022.9830144"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/FDTC.2010.18"},{"year":"2022","author":"taneja","journal-title":"In-Memory and Immersed-In-Logic Primitives for Ubiquitous Hardware Security","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/JPROC.2012.2188769"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/HST.2016.7495583"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TNS.2013.2255312"}],"container-title":["IEEE Journal of Solid-State Circuits"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4\/10262388\/10136181.pdf?arnumber=10136181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T18:15:16Z","timestamp":1697480116000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10136181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":51,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jssc.2023.3274596","relation":{},"ISSN":["0018-9200","1558-173X"],"issn-type":[{"type":"print","value":"0018-9200"},{"type":"electronic","value":"1558-173X"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}