{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T20:11:09Z","timestamp":1651695069715},"reference-count":9,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/mm.2018.032271066","type":"journal-article","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T19:18:15Z","timestamp":1526066295000},"page":"98-106","source":"Crossref","is-referenced-by-count":6,"title":["Motivating Security-Aware Energy Management"],"prefix":"10.1109","volume":"38","author":[{"given":"Adrian","family":"Tang","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Simha","family":"Sethumadhavan","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Salvatore","family":"Stolfo","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"263","reference":[{"key":"ref4","year":"0","journal-title":"Powerful Dense 4-Socket Servers for Next-Generation Data Center and Cloud Deployments"},{"key":"ref3","year":"0","journal-title":"Power Management with big LITTLE A Technical Overview"},{"key":"ref6","article-title":"Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault","author":"tunstall","year":"0","journal-title":"IFIP International Workshop on Information Security Theory and Practices"},{"key":"ref5","year":"2013","journal-title":"Snapdragon S4 Processors System on Chip Solutions for a New Mobile Age"},{"key":"ref8","author":"lipp","year":"2018","journal-title":"Meltdown"},{"key":"ref7","article-title":"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors","author":"kim","year":"0","journal-title":"ACM\/IEEE 41st International Symposium on Computer Architecture (ISCA)"},{"key":"ref2","article-title":"ARMageddon: Cache Attacks on Mobile Devices","author":"lipp","year":"0","journal-title":"25th USENIX Security Symposium"},{"key":"ref9","author":"kocher","year":"2018","journal-title":"Spectre Attacks Exploiting Speculative Execution"},{"key":"ref1","article-title":"CLKscrew: Exposing the Perils of Security-Oblivious Energy Management","author":"tang","year":"0","journal-title":"26th USENIX Security Symposium"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/40\/8357988\/08358034.pdf?arnumber=8358034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T19:54:36Z","timestamp":1651694076000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8358034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":9,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mm.2018.032271066","relation":{},"ISSN":["0272-1732","1937-4143"],"issn-type":[{"value":"0272-1732","type":"print"},{"value":"1937-4143","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}