{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:40Z","timestamp":1750306300799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2899015.2899019","type":"proceedings-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T22:58:31Z","timestamp":1464130711000},"page":"15-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System"],"prefix":"10.1145","author":[{"given":"Wei","family":"He","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Jakub","family":"Breier","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"volume-title":"information technology-security techniques-lightweight cryptography-part 2: Block cipher","year":"2012","key":"e_1_3_2_1_1_1","unstructured":"Iso\/iec 29192--2:2012 , information technology-security techniques-lightweight cryptography-part 2: Block cipher ( 2012 ). 2012. Iso\/iec 29192--2:2012, information technology-security techniques-lightweight cryptography-part 2: Block cipher (2012). 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752713"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-145"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology-CRYPTO'97","author":"Biham Eli","year":"1997","unstructured":"Eli Biham and Adi Shamir . Differential fault analysis of secret key cryptosystems . In Advances in Cryptology-CRYPTO'97 , pages 513 -- 525 . Springer , 1997 . Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology-CRYPTO'97, pages 513--525. Springer, 1997."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2160929"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0022-y"},{"key":"e_1_3_2_1_11_1","volume-title":"Provably secure concurrent error detection against differential fault analysis. IACR Cryptology ePrint Archive","author":"Guo Xiaofei","year":"2012","unstructured":"Xiaofei Guo , Debdeep Mukhopadhyay , and Ramesh Karri . Provably secure concurrent error detection against differential fault analysis. IACR Cryptology ePrint Archive , 2012 :552, 2012. Xiaofei Guo, Debdeep Mukhopadhyay, and Ramesh Karri. Provably secure concurrent error detection against differential fault analysis. IACR Cryptology ePrint Archive, 2012:552, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2349007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009725"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2006.50"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Mobility and Security, 2008. NTMS'08.","author":"Khelil Farouk","year":"2008","unstructured":"Farouk Khelil , Mohamed Hamdi , Sylvain Guilley , Jean Luc Danger , and Nidhal Selmane . Fault analysis attack on an fpga aes implementation. In New Technologies , Mobility and Security, 2008. NTMS'08. , pages 1 -- 5 . IEEE, 2008 . Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean Luc Danger, and Nidhal Selmane. Fault analysis attack on an fpga aes implementation. In New Technologies, Mobility and Security, 2008. NTMS'08., pages 1--5. IEEE, 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE, 100(Special Centennial Issue):1287--1308","author":"Kim Kyoung-Dae","year":"2012","unstructured":"Kyoung-Dae Kim and Panganamala R Kumar . Cyber--physical systems : A perspective at the centennial . Proceedings of the IEEE, 100(Special Centennial Issue):1287--1308 , 2012 . Kyoung-Dae Kim and Panganamala R Kumar. Cyber--physical systems: A perspective at the centennial. Proceedings of the IEEE, 100(Special Centennial Issue):1287--1308, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_8"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.33"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2031651"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.199"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732204"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"e_1_3_2_1_26_1","series-title":"Lecture Notes in Computer Science","first-page":"2","volume-title":"BurtonS. Kaliski,c cetinK. Ko\\c c","author":"Skorobogatov P.","year":"2002","unstructured":"Sergei P. Skorobogatov and Ross J. Anderson . Optical Fault Induction Attacks . In BurtonS. Kaliski,c cetinK. Ko\\c c , and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002 , volume 2523 of Lecture Notes in Computer Science , pages 2 -- 12 . Springer Berlin Heidelberg , 2003. SergeiP. Skorobogatov and RossJ. Anderson. Optical Fault Induction Attacks. In BurtonS. Kaliski,c cetinK. Ko\\c c, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 2--12. Springer Berlin Heidelberg, 2003."},{"key":"e_1_3_2_1_27_1","volume-title":"A survey of hardware trojan taxonomy and detection","author":"Tehranipoor Mohammad","year":"2010","unstructured":"Mohammad Tehranipoor and Farinaz Koushanfar . A survey of hardware trojan taxonomy and detection . 2010 . Mohammad Tehranipoor and Farinaz Koushanfar. A survey of hardware trojan taxonomy and detection. 2010."},{"key":"e_1_3_2_1_28_1","first-page":"1242","volume-title":"Michael Goessel. Low Cost Concurrent Error Detection for the Advanced Encryption Standard. In In Proceedings of the IEEE International Test Conference (ITC 2004","author":"Wu Kaijie","year":"2004","unstructured":"Kaijie Wu , Ramesh Karri , Grigori Kuznetsov , and Michael Goessel. Low Cost Concurrent Error Detection for the Advanced Encryption Standard. In In Proceedings of the IEEE International Test Conference (ITC 2004 ), pages 1242 -- 1248 , 2004 . Kaijie Wu, Ramesh Karri, Grigori Kuznetsov, and Michael Goessel. Low Cost Concurrent Error Detection for the Advanced Encryption Standard. In In Proceedings of the IEEE International Test Conference (ITC 2004), pages 1242--1248, 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2899015.2899019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2899015.2899019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:16Z","timestamp":1750221556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2899015.2899019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":29,"alternative-id":["10.1145\/2899015.2899019","10.1145\/2899015"],"URL":"https:\/\/doi.org\/10.1145\/2899015.2899019","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}