{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:07:17Z","timestamp":1759147637597},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/vlsi-soc.2015.7314443","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T23:01:11Z","timestamp":1446505271000},"page":"355-360","source":"Crossref","is-referenced-by-count":11,"title":["Trace Buffer Attack: Security versus observability study in post-silicon debug"],"prefix":"10.1109","author":[{"given":"Yuanwen","family":"Huang","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Timing Channels in Cryptography A Micro-Architectural Perspective","year":"0","author":"rebeiro","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.44"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2014.6847798"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02384-2_26","article-title":"An improved fault based attack of the advanced encryption standard","author":"mukhopadhyay","year":"2009","journal-title":"Progress in Cryptology AFRICACRYPT"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2014.7004193"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2192457"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105391"},{"journal-title":"ARM Embedded Trace Buffer","year":"0","key":"ref4"},{"journal-title":"FIPS 197 Advanced Encryption Standard","year":"2001","key":"ref3"},{"key":"ref6","article-title":"Cache attacks and countermeasures: The case of AES","author":"osvik","year":"2006","journal-title":"CT-RSA"},{"key":"ref5","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Crypto"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"ref7","article-title":"Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation","author":"genkin","year":"2015","journal-title":"Cryptology ePrint Archive Report 2005\/146"},{"key":"ref2","article-title":"Pushing the limits: A very compact and a threshold implementation of AES","author":"moradi","year":"0","journal-title":"Advances in Cryptology - EUROCRYPT 2011"},{"key":"ref9","article-title":"Optical fault induction attacks","author":"skorobogatov","year":"2003","journal-title":"Springer"},{"key":"ref1","article-title":"Biclique cryptanalysis of the full AES","author":"bogdanov","year":"0","journal-title":"Advances in Cryptology - ASIACRYPT 2011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2307533"},{"journal-title":"OpenCores AES-128 cipher","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2014.6783318"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1973009.1973111"},{"journal-title":"OpenCores AES ciphers (all key sizes)","year":"0","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_11"}],"event":{"name":"2015 IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)","start":{"date-parts":[[2015,10,5]]},"location":"Daejeon, South Korea","end":{"date-parts":[[2015,10,7]]}},"container-title":["2015 IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7304349\/7314373\/07314443.pdf?arnumber=7314443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:43:55Z","timestamp":1498257835000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7314443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/vlsi-soc.2015.7314443","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}