{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:27:45Z","timestamp":1763447265166,"version":"3.45.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/socc66126.2025.11235448","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T18:39:03Z","timestamp":1763404743000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["On Enhancing the Security Against Memory Disclosure Attacks"],"prefix":"10.1109","author":[{"given":"Prokash","family":"Ghosh","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bombay,Dept. of EE,Mumbai,India"}]},{"given":"Gaurav","family":"Kumar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Dept. of EE,Jammu,India"}]},{"given":"Sohan","family":"Lal","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology,Massively Parallel Systems Group,Germany"}]},{"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Dept. of EE,Jammu,India"}]},{"given":"Virendra","family":"Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bombay,Dept. of EE,Mumbai,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC53659.2021.00017"},{"article-title":"Recovering aes keys with a deep cold boot attack","volume-title":"Proc. of 38th International Conference on Machine Learning","author":"Zimerman","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00030"},{"article-title":"Taking dma attacks to the next level: How to do arbitrary memory reads\/writes in a live and unmodified system using a rogue memory controller","volume-title":"Proceedings of BlackHat","author":"Trikalinou","key":"ref5"},{"article-title":"Amd memory encryption","year":"2021","author":"Kaplan","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857847"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342085"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2737646"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-020-05867-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2024.3360370"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-022-00625-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00038"},{"key":"ref16","article-title":"DDR4 SDRAM protocols and specifications : Standard"},{"article-title":"An Off-Chip attack on hardware enclaves via the memory bus","volume-title":"29th USENIX Security Symposium","author":"Lee","key":"ref17"}],"event":{"name":"2025 IEEE 38th International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2025,9,29]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2025,10,1]]}},"container-title":["2025 IEEE 38th International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11235309\/11235311\/11235448.pdf?arnumber=11235448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:23:34Z","timestamp":1763447014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11235448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/socc66126.2025.11235448","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}