{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:55:55Z","timestamp":1725699355325},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/mwscas.2017.8052984","type":"proceedings-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T20:21:31Z","timestamp":1508876491000},"page":"559-562","source":"Crossref","is-referenced-by-count":3,"title":["ATAVE: A framework for automatic timing attack vulnerability evaluation"],"prefix":"10.1109","author":[{"given":"Jungmin","family":"Park","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Corba","sequence":"additional","affiliation":[]},{"given":"Antonio E.","family":"de la Sema","sequence":"additional","affiliation":[]},{"given":"Richard L.","family":"Vigeant","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Vcs datasheet","year":"2016","key":"ref6"},{"journal-title":"Intel","article-title":"Quartus prime","year":"0","key":"ref5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref2","first-page":"1","article-title":"Remote timing attacks are practical","author":"brumley","year":"2003","journal-title":"Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12 Ser SSYM'03"},{"key":"ref1","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, RSA, dss, and other systems","author":"kocher","year":"1996","journal-title":"Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology ser CRYPTO &#x2018;96"}],"event":{"name":"2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)","start":{"date-parts":[[2017,8,6]]},"location":"Boston, MA, USA","end":{"date-parts":[[2017,8,9]]}},"container-title":["2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8039346\/8052834\/08052984.pdf?arnumber=8052984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:41:30Z","timestamp":1509140490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8052984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/mwscas.2017.8052984","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}