{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:06:11Z","timestamp":1763154371074,"version":"3.45.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2023YFB3106800"],"award-info":[{"award-number":["2023YFB3106800"]}]},{"name":"National Cryptologic Science Fund of China","award":["2025NCSF02058"],"award-info":[{"award-number":["2025NCSF02058"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3591520","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T18:08:53Z","timestamp":1753207733000},"page":"6826-6843","source":"Crossref","is-referenced-by-count":0,"title":["Exploring the Internals of Fault-Induced Data-Level Vulnerabilities in Cryptographic Libraries"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8859-8830","authenticated-orcid":false,"given":"Guorui","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2596-2221","authenticated-orcid":false,"given":"Qianmei","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Xinjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2321-4910","authenticated-orcid":false,"given":"Yuan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9718-1321","authenticated-orcid":false,"given":"Shize","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3069715"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.34"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2005.862424"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-88-470-2772-5_7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.150-172"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.547-572"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.46"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3047766"},{"key":"ref20","first-page":"49","article-title":"Dowser: A guided fuzzer to find buffer overflow vulnerabilities","volume-title":"Proc. 22nd USENIX Secur. Symp.","author":"Haller"},{"key":"ref21","first-page":"47","article-title":"Binary-level directed fuzzing for $\\lbrace${Use-After-Free$\\rbrace$} vulnerabilities","volume-title":"Proc. 23rd Int. Symp. Res. Attacks Intrusions Defenses","author":"Nguyen"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2018.00014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-020-00364-5"},{"article-title":"Formal fault injection vulnerability detection in binaries: A software process and hardware validation","year":"2019","author":"Jafri","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630118"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4794"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3628160"},{"key":"ref29","first-page":"1847","article-title":"Fuzztruction: Using fault injection-based fuzzing to leverage implicit domain knowledge","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Bars"},{"key":"ref30","volume-title":"Fault Injection Techniques and Tools for Embedded Systems Reliability Evaluation","volume":"23","author":"Benso","year":"2003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i4.690-736"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DFT50435.2020.9250822"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0941-3_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_22"},{"article-title":"Rizin","year":"2022","author":"Organization","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_13"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"article-title":"Libgcrypt","year":"2014","author":"Koch","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_7"},{"volume-title":"Analysis of recent attacks on AES","year":"2012","author":"Gstir","key":"ref44"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11088130.pdf?arnumber=11088130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:13Z","timestamp":1763154073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11088130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":41,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3591520","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}