{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:06Z","timestamp":1740132006990,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation (Deutsche Forschungsgemeinschaft)","doi-asserted-by":"publisher","award":["BE 1176-15\/2","PO 1220-2\/2","GRK 1103","SFB\/TR 14 AVACS"],"award-info":[{"award-number":["BE 1176-15\/2","PO 1220-2\/2","GRK 1103","SFB\/TR 14 AVACS"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/tcad.2015.2448687","type":"journal-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T15:01:36Z","timestamp":1435071696000},"page":"1358-1369","source":"Crossref","is-referenced-by-count":5,"title":["Formal Vulnerability Analysis of Security Components"],"prefix":"10.1109","volume":"34","author":[{"given":"Linus","family":"Feiten","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Schubert","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Tomashevich","sequence":"additional","affiliation":[]},{"given":"Ilia","family":"Polian","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Becker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"54","article-title":"Model counting: A new strategy for obtaining good bounds","author":"gomes","year":"2006","journal-title":"Proc 21st Nat Conf Artif Intell (AAAI)"},{"key":"ref38","first-page":"1173","article-title":"Performing incremental Bayesian inference by dynamic model counting","author":"li","year":"2006","journal-title":"Proc 21st Nat Conf Artif Intell (AAAI)"},{"key":"ref33","first-page":"399","article-title":"Predicting learnt clauses quality in modern SAT solvers","author":"audemard","year":"2009","journal-title":"Proc IJCAI"},{"key":"ref32","article-title":"Antom&#x2014;solver description","author":"schubert","year":"2010","journal-title":"Proc SAT Race"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2011.5994535"},{"journal-title":"Digital Systems Testing and Testable Design","year":"1990","author":"abramovici","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923107"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-009-0124-7"},{"key":"ref35","first-page":"502","article-title":"An extensible SAT-solver","author":"e\u00e9n","year":"2003","journal-title":"Theory and Applications of Satisfiability Testing (LNCS 2919)"},{"article-title":"Lingeling, plingeling, picoSAT and precoSAT at SAT race 2010","year":"2010","author":"biere","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1629963"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1261389"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2010.5491812"},{"key":"ref2","first-page":"29","article-title":"The EM side-channel(s)","author":"agrawal","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems (LNCS 2523)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref20","first-page":"7","article-title":"Electromagnetic transient faults injection on a hardware and a software implementations of AES","author":"dehbaoui","year":"2007","journal-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography"},{"journal-title":"New Methods of Concurrent Checking","year":"2008","author":"g\u00f6ssel","key":"ref22"},{"key":"ref21","first-page":"398","article-title":"Towards sound approaches to counteract power analysis attacks","author":"chari","year":"0","journal-title":"Adv Cryptology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2003.813129"},{"key":"ref23","article-title":"Robust error detection in communication and computation channels","author":"karpovsky","year":"2007","journal-title":"Proc Int Workshop Spectral Techniques"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2005.1584070"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028924"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311880"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2011.5993840"},{"key":"ref40","first-page":"565","article-title":"Probabilistic planning via heuristic forward search and weighted model counting","volume":"30","author":"domshlak","year":"2007","journal-title":"J Artif Int Res"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2012.6313851"},{"journal-title":"Techniques for Cryptanalysis of Block Ciphers","year":"2011","author":"biham","key":"ref13"},{"key":"ref14","first-page":"104","article-title":"Timing attacks on implementations of Diffie&#x2013;Hellman, RSA, DSS and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Proc Int'l Cryptol Conf on Adv in Cryptol (CRYPTO)"},{"key":"ref15","first-page":"473","article-title":"Covert and side channels due to processor architecture","author":"wang","year":"2008","journal-title":"Proc Comput Security Appl Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.12"},{"key":"ref19","article-title":"Secure smartcard design against laser fault injection attacks","author":"derouet","year":"2007","journal-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref3","first-page":"473","article-title":"Covert and side channels due to processor architecture","author":"wang","year":"2006","journal-title":"Proc Comput Security Appl Conf"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","article-title":"Differential fault analysis of the advanced encryption standard using a single fault","author":"tunstall","year":"2011","journal-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72354-7_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_10"},{"key":"ref7","first-page":"147","article-title":"Improved differential fault analysis of Trivium","author":"mohamed","year":"2011","journal-title":"Proc COSADE"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560193"},{"journal-title":"Fault-Tolerant Systems","year":"2007","author":"koren","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231098"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11814948_38"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2012.6313862"},{"journal-title":"Fundamentals of Logic Design","year":"2009","author":"roth","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/321033.321034"},{"key":"ref41","first-page":"70","article-title":"A model counting characterization of diagnoses","author":"kumar","year":"0","journal-title":"International Workshop on Principles of Diagnosis 2002 Proceedings"},{"key":"ref44","first-page":"20","article-title":"Combining component caching and clause learning for effective model counting","author":"sang","year":"2004","journal-title":"Proc Int Conf Theory and Appl Satisfiability Testing"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/7166378\/07131502.pdf?arnumber=7131502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:52:06Z","timestamp":1641988326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7131502\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":49,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2015.2448687","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2015,8]]}}}