{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:08Z","timestamp":1772164028643,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T00:00:00Z","timestamp":1371686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,20]]},"DOI":"10.1145\/2491899.2465570","type":"proceedings-article","created":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T12:03:50Z","timestamp":1370952230000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis"],"prefix":"10.1145","author":[{"given":"Carlos","family":"Moreno","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Sebastian","family":"Fischmeister","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"M. Anwar","family":"Hasan","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"AVR 8- andhbox32-bit Microcontrollers","author":"Atmel Corporation","year":"2012","unstructured":"Atmel Corporation . AVR 8- andhbox32-bit Microcontrollers , 2012 . URL http:\/\/www.atmel.com\/products\/microcontrollers\/avr\/. Atmel Corporation. AVR 8- andhbox32-bit Microcontrollers, 2012. URL http:\/\/www.atmel.com\/products\/microcontrollers\/avr\/."},{"key":"e_1_3_2_1_2_1","first-page":"13","volume":"2002","author":"Chari S.","year":"2003","unstructured":"S. Chari , J. R. Rao , and P. Rohatgi . Template Attacks. Cryptographic Hardware and Embedded Systems -- CHES 2002 , pages 13 -- 28 , 2003 . S. Chari, J. R. Rao, and P. Rohatgi. Template Attacks. Cryptographic Hardware and Embedded Systems -- CHES 2002, pages 13--28, 2003.","journal-title":"Template Attacks. Cryptographic Hardware and Embedded Systems -- CHES"},{"key":"e_1_3_2_1_3_1","volume-title":"Software Engineering for Real-Time Systems","author":"Cooling J.","year":"2003","unstructured":"J. Cooling . Software Engineering for Real-Time Systems . Addison-Wesley , 2003 . J. Cooling. Software Engineering for Real-Time Systems. Addison-Wesley, 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2009","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest , and C. Stein . Introduction to Algorithms . The MIT Press , Third edition, 2009 . T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. The MIT Press, Third edition, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.840301"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_7_1","volume-title":"Computer Organization","author":"Hamacher C.","year":"2002","unstructured":"C. Hamacher , Z. Vranesic , and S. Zaky . Computer Organization . McGraw-Hill , Fifth edition, 2002 . C. Hamacher, Z. Vranesic, and S. Zaky. Computer Organization. McGraw-Hill, Fifth edition, 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson D.","year":"2004","unstructured":"D. Hankerson , A. Menezes , and S. Vanstone . Guide to Elliptic Curve Cryptography . Springer-Verlag , 2004 . D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag, 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Architecture: A Quantitative Approach","author":"Hennessy J. L.","year":"2007","unstructured":"J. L. Hennessy and D. A. Patterson . Computer Architecture: A Quantitative Approach . Morgan Kaufmann Publishers , Fourth edition, 2007 . J. L. Hennessy and D. A. Patterson. Computer Architecture: A Quantitative Approach. Morgan Kaufmann Publishers, Fourth edition, 2007."},{"key":"e_1_3_2_1_10_1","unstructured":"HT Omega. Claro Plus -- Online specifications. URL http:\/\/www.htomega.com\/claroplus.html.  HT Omega. Claro Plus -- Online specifications. URL http:\/\/www.htomega.com\/claroplus.html."},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Cryptology","author":"Kocher P.","year":"1996","unstructured":"P. Kocher . Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems . Advances in Cryptology , 1996 . P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Advances in Cryptology, 1996."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_14_1","volume-title":"Computer Security: Art and Science","author":"Bishop Matt","year":"2003","unstructured":"Matt Bishop . Computer Security: Art and Science . Addison-Wesley , 2003 . Matt Bishop. Computer Security: Art and Science. Addison-Wesley, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Audacity: Free Audio Editor","author":"Mazzoni D.","unstructured":"D. Mazzoni . Audacity: Free Audio Editor and Recorder. URL http:\/\/audacity.sourceforge.net. D. Mazzoni. Audacity: Free Audio Editor and Recorder. URL http:\/\/audacity.sourceforge.net."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_17_1","volume-title":"Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging","author":"Moreno C.","year":"2013","unstructured":"C. Moreno . Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging , 2013 . PhD Thesis (Final version to be submitted May 2013). C. Moreno. Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging, 2013. PhD Thesis (Final version to be submitted May 2013)."},{"key":"e_1_3_2_1_18_1","author":"Moreno C.","year":"2011","unstructured":"C. Moreno and M. A. Hasan . SPA-Resistant Binary Exponentiation with Optimal Execution Time. Journal of Cryptographic Engineering, pages 1--13 , 2011 . C. Moreno and M. A. Hasan. SPA-Resistant Binary Exponentiation with Optimal Execution Time. Journal of Cryptographic Engineering, pages 1--13, 2011.","journal-title":"Journal of Cryptographic Engineering, pages 1--13"},{"key":"e_1_3_2_1_19_1","volume-title":"Digital Signal Processing: Principles, Algorithms, and Applications","author":"Proakis J. G.","year":"2006","unstructured":"J. G. Proakis and D. G. Manolakis . Digital Signal Processing: Principles, Algorithms, and Applications . Prentice Hall , Fourth edition, 2006 . J. G. Proakis and D. G. Manolakis. Digital Signal Processing: Principles, Algorithms, and Applications. Prentice Hall, Fourth edition, 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"Building Secure Software","author":"Viega J.","year":"2002","unstructured":"J. Viega and G. McGraw . Building Secure Software . Addison-Wesley , 2002 . J. Viega and G. McGraw. Building Secure Software. Addison-Wesley, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1002\/9781119952954","volume-title":"Statistical Pattern Recognition","author":"Webb A. R.","year":"2011","unstructured":"A. R. Webb and K. D. Copsey . Statistical Pattern Recognition . Wiley , third edition, 2011 . A. R. Webb and K. D. Copsey. Statistical Pattern Recognition. Wiley, third edition, 2011."}],"event":{"name":"LCTES '13: SIGPLAN\/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems 2013","location":"Seattle Washington USA","acronym":"LCTES '13","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 14th ACM SIGPLAN\/SIGBED conference on Languages, compilers and tools for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491899.2465570","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491899.2465570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:28:40Z","timestamp":1750217320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491899.2465570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,20]]},"references-count":21,"alternative-id":["10.1145\/2491899.2465570","10.1145\/2491899"],"URL":"https:\/\/doi.org\/10.1145\/2491899.2465570","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2499369.2465570","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,6,20]]},"assertion":[{"value":"2013-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}