{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T02:44:24Z","timestamp":1748745864780,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/recosoc.2011.5981510","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T14:03:34Z","timestamp":1315836214000},"page":"1-7","source":"Crossref","is-referenced-by-count":24,"title":["Temperature-based covert channel in FPGA systems"],"prefix":"10.1109","author":[{"given":"Taras","family":"Iakymchuk","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Nikodem","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Kepa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.54"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0115-0"},{"journal-title":"High Performance Microchip Supply","year":"2005","key":"ref12"},{"key":"ref13","article-title":"Researchers Uncover Undetectable Chip Hack","author":"mcmillan","year":"2008","journal-title":"IDG News Service"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.28"},{"key":"ref15","first-page":"33","article-title":"FPGA-based single chip cryptographic solution","author":"mclean","year":"2007","journal-title":"Military Embedded Systems"},{"journal-title":"Method of Actively Tagging Electronic Designs and Intellectual Property Cores","year":"2008","author":"kean","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2010.5483027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1950413.1950462"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-63465-7_212","article-title":"Thermal monitoring on FPGAs using ring-oscillators","volume":"1304","author":"boemo","year":"1997","journal-title":"Field-Programmable Logic and Applications 1997"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39757-4_25"},{"key":"ref3","article-title":"An 802.11 MAC layer covert channel","author":"calhoun","year":"2010","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref6","first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/978-3-540-30564-4_14","article-title":"A Subliminal Channel in Secret Block Ciphers","volume":"3357","author":"young","year":"2005","journal-title":"LNCS Selected Areas in Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"ref7","first-page":"249","article-title":"A Wireless Covert Channel on Smart Cards","volume":"4307","author":"dyrkolbotn","year":"2006","journal-title":"Information Security LNCS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559051"},{"key":"ref9","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proc Annu Int Cryptology Conf Advances in Cryptology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"journal-title":"Peter Athanas from Configurable Computing Lab at Virginia Tech","year":"2011","key":"ref20"},{"key":"ref21","article-title":"Differential Fault Analysis","author":"schmidt","year":"2008","journal-title":"Tech report of Secure Business"}],"event":{"name":"2011 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)","start":{"date-parts":[[2011,6,20]]},"location":"Montpellier, France","end":{"date-parts":[[2011,6,22]]}},"container-title":["6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5967008\/5981488\/05981510.pdf?arnumber=5981510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T07:16:50Z","timestamp":1560583010000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5981510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/recosoc.2011.5981510","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}