{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T09:35:24Z","timestamp":1774431324087,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NEUROTEC II","award":["16ME0398K"],"award-info":[{"award-number":["16ME0398K"]}]},{"name":"NEUROTEC II","award":["16ME0399"],"award-info":[{"award-number":["16ME0399"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tr.2024.3371589","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:09:34Z","timestamp":1710342574000},"page":"4499-4513","source":"Crossref","is-referenced-by-count":8,"title":["It's Getting Hot in Here: Hardware Security Implications of Thermal Crosstalk on ReRAMs"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9673-3070","authenticated-orcid":false,"given":"Felix","family":"Staudigl","sequence":"first","affiliation":[{"name":"Institute for Communication Technologies, Embedded Systems, RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0543-9045","authenticated-orcid":false,"given":"Hazem","family":"Al Indari","sequence":"additional","affiliation":[{"name":"Institute for Communication Technologies, Embedded Systems, RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6967-0032","authenticated-orcid":false,"given":"Daniel","family":"Sch\u00f6n","sequence":"additional","affiliation":[{"name":"Peter Gr&#x00FC;nberg Institut (PGI-7), Forschungszentrum J&#x00FC;lich GmbH, J&#x00FC;lich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6758-7163","authenticated-orcid":false,"given":"Hsin-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Peter Gr&#x00FC;nberg Institut (PGI-10), Forschungszentrum J&#x00FC;lich GmbH, J&#x00FC;lich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3812-727X","authenticated-orcid":false,"given":"Dominik","family":"Sisejkovic","sequence":"additional","affiliation":[{"name":"Corporate Research, Robert Bosch GmbH, Renningen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8669-1225","authenticated-orcid":false,"given":"Jan Moritz","family":"Joseph","sequence":"additional","affiliation":[{"name":"Institute for Communication Technologies, Embedded Systems, RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5432-0286","authenticated-orcid":false,"given":"Vikas","family":"Rana","sequence":"additional","affiliation":[{"name":"Peter Gr&#x00FC;nberg Institut (PGI-10), Forschungszentrum J&#x00FC;lich GmbH, J&#x00FC;lich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4258-2673","authenticated-orcid":false,"given":"Stephan","family":"Menzel","sequence":"additional","affiliation":[{"name":"Peter Gr&#x00FC;nberg Institut (PGI-7), Forschungszentrum J&#x00FC;lich GmbH, J&#x00FC;lich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9113-9531","authenticated-orcid":false,"given":"Amelie","family":"Hagelauer","sequence":"additional","affiliation":[{"name":"Chair of Micro- and Nanosystems Technology, Technical University of Munich, M&#x00FC;nchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6735-3033","authenticated-orcid":false,"given":"Rainer","family":"Leupers","sequence":"additional","affiliation":[{"name":"Institute for Communication Technologies, Embedded Systems, RWTH Aachen University, Aachen, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.811807"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6463\/ab7794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nmat2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-018-0092-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCT.1971.1083337"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4687366"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1063\/5.0047641"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC53125.2021.9606998"},{"key":"ref10","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","author":"Mark Seaborn","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00085"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774651"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2940449"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712492"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2937817"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218649"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136903"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/vlsid60093.2024.00071"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/nnano.2008.160"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/adma.200900375"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1021\/acsaelm.1c00398"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/aelm.201670006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/adfm.201101117"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/aelm.201700294"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1039\/C8FD00117K"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/adfm.202213943"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/23746149.2016.1259585"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2021.3097975"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1063\/5.0003840"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/0957-4484\/22\/48\/485203"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7567\/1347-4065\/aafd8d"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2021.3110464"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/isscc.2018.8310392"},{"key":"ref35","article-title":"Integrated semiconductor memory with an arrangement of nonvolatile memory cells, and method","author":"Liaw","year":"2007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/nmat2748"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3175947"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.808156"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2000.904447"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630097"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.1990.111105"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MTDT.2002.1029773"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/date.2005.161"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IIRW.2010.5706509"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref47","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","author":"Seaborn","year":"2015"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951730"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494868"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_29"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.63"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00089"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266454"},{"key":"ref54","first-page":"19","article-title":"One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation","volume-title":"Proc. USENIX Secur. Symp.","author":"Xiao","year":"2016"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_3"},{"key":"ref57","first-page":"213","article-title":"Throwhammer: Rowhammer attacks over the network and defenses","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Tatar","year":"2018"},{"key":"ref58","article-title":"Comsol multiphysics","year":"2021"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3018502"},{"key":"ref60","article-title":"Virtuoso system design platform","volume-title":"Cadence Des. Syst., Inc.","year":"2021"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1063\/1.5108654"},{"key":"ref62","article-title":"Juelich Aachen resistive switching tools (JART)","author":"Menzel","year":"2023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25455-0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1021\/nl203687n"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1002\/aisy.202170065"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1038\/s41563-019-0291-x"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04992-8"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM13553.2020.9371976"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/IMW.2018.8388846"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223657"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/11273031\/10472406.pdf?arnumber=10472406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:42:03Z","timestamp":1764787323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10472406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":70,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3371589","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}