{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:25Z","timestamp":1750307065271,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,7]],"date-time":"2012-10-07T00:00:00Z","timestamp":1349568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,7]]},"DOI":"10.1145\/2380403.2380413","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T12:20:46Z","timestamp":1349785246000},"page":"13-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Side channel attacks and the non volatile memory of the future"],"prefix":"10.1145","author":[{"given":"Zoya","family":"Dyka","sequence":"first","affiliation":[{"name":"IHP, Frankfurt (Oder), Germany"}]},{"given":"Christian","family":"Walczyk","sequence":"additional","affiliation":[{"name":"IHP, Frankfurt (Oder), Germany"}]},{"given":"Damian","family":"Walczyk","sequence":"additional","affiliation":[{"name":"IHP, Frankfurt (Oder), Germany"}]},{"given":"Christian","family":"Wenger","sequence":"additional","affiliation":[{"name":"IHP, Frankfurt (Oder), Germany"}]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[{"name":"IHP, Frankfurt (Oder), Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Computer Laboratory","author":"Skorobogatov S. P.","year":"2005","unstructured":"S. P. Skorobogatov : Semi-invasive attacks - a new approach to hardware security analysis , Computer Laboratory , University of Cambridge , Technical report ACAM-cl-tr-630 , 2005 S. P. Skorobogatov: Semi-invasive attacks - a new approach to hardware security analysis, Computer Laboratory, University of Cambridge, Technical report ACAM-cl-tr-630 , 2005"},{"key":"e_1_3_2_1_2_1","first-page":"158","volume-title":"Mangard, S., Standaert, F.-X. (eds.) CHES","author":"S.","year":"2010","unstructured":"Skorobogatov, S. : Flash memory 'Bumping' attacks . In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010 . LNCS, vol. 6225 , pp. 158 -- 172 . Springer , Heidelberg (2010), http:\/\/www.springerlink.com\/content\/5777503941l561x1\/ Skorobogatov, S.: Flash memory 'Bumping' attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 158--172. Springer, Heidelberg (2010), http:\/\/www.springerlink.com\/content\/5777503941l561x1\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.18"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225028"},{"volume-title":"Proceedings of the 31 International Symposium for Testing and Failure Analysis November 6--10, 2005, McEnery Convention Center","author":"Nardi Christophe De","key":"e_1_3_2_1_5_1","unstructured":"Christophe De Nardi , Romain Desplats , Philippe Perdu , F\u00e9lix Beaudoin , Jean Luc Gauffier : EEPROM Failure Analysis Methodology: Can Programmed Charges Be Measured Directly by Electrical Techniques of Scanning Probe Microscopy? , Proceedings of the 31 International Symposium for Testing and Failure Analysis November 6--10, 2005, McEnery Convention Center , San Jose, California, USA Christophe De Nardi, Romain Desplats, Philippe Perdu, F\u00e9lix Beaudoin, Jean Luc Gauffier: EEPROM Failure Analysis Methodology: Can Programmed Charges Be Measured Directly by Electrical Techniques of Scanning Probe Microscopy?, Proceedings of the 31 International Symposium for Testing and Failure Analysis November 6--10, 2005, McEnery Convention Center, San Jose, California, USA"},{"key":"e_1_3_2_1_6_1","volume-title":"Department of Electrical and Electronic Engineering","author":"Konopinski D. I.","year":"2009","unstructured":"D. I. Konopinski , A. J. Kenyon: Data recovery from damaged electronic memory devices , Department of Electrical and Electronic Engineering , University College London , http:\/\/www.ee.ucl.ac.uk\/lcs\/previous\/LCS 2009 \/NEMS\/Konopinski.pdf D. I. Konopinski, A. J. Kenyon: Data recovery from damaged electronic memory devices, Department of Electrical and Electronic Engineering, University College London, http:\/\/www.ee.ucl.ac.uk\/lcs\/previous\/LCS2009\/NEMS\/Konopinski.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1149\/1.3489079"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2011.2160265"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mee.2011.03.123"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. Walczyk T. Bertaud M. Sowinska M. Lukosius M. A. Schubert A. Fox D. Wolansky A. Scheit M. Fraschke G. Schoof Ch. Wolf R. Kraemer B. Tillack R. Korolevych V. Stikanov Ch. Wenger T. Schroeder and Ch. Walczyk: \"Resistive switching behavior in TiN\/ HfO2\/Ti\/TiN devices\" to be presented at the 2012 ISCDG  D. Walczyk T. Bertaud M. Sowinska M. Lukosius M. A. Schubert A. Fox D. Wolansky A. Scheit M. Fraschke G. Schoof Ch. Wolf R. Kraemer B. Tillack R. Korolevych V. Stikanov Ch. Wenger T. Schroeder and Ch. Walczyk: \"Resistive switching behavior in TiN\/ HfO2\/Ti\/TiN devices\" to be presented at the 2012 ISCDG","DOI":"10.1109\/ISCDG.2012.6360035"}],"event":{"name":"ESWEEK'12: Eighth Embedded System Week","sponsor":["CEDA","SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS"],"location":"Tampere Finland","acronym":"ESWEEK'12"},"container-title":["Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2380403.2380413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2380403.2380413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:21Z","timestamp":1750238481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2380403.2380413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,7]]},"references-count":10,"alternative-id":["10.1145\/2380403.2380413","10.1145\/2380403"],"URL":"https:\/\/doi.org\/10.1145\/2380403.2380413","relation":{},"subject":[],"published":{"date-parts":[[2012,10,7]]},"assertion":[{"value":"2012-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}