{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:35Z","timestamp":1750221215896,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,23]],"date-time":"2018-06-23T00:00:00Z","timestamp":1529712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF CAREER","award":["CNS1652474"],"award-info":[{"award-number":["CNS1652474"]}]},{"name":"NSF\/SRC STARSS","award":["CNS-1717130"],"award-info":[{"award-number":["CNS-1717130"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,23]]},"DOI":"10.1145\/3225209.3225212","type":"proceedings-article","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T15:14:53Z","timestamp":1530285293000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Exploiting PDN noise to thwart correlation power analysis attacks in 3D ICs"],"prefix":"10.1145","author":[{"given":"Jaya","family":"Dofe","sequence":"first","affiliation":[{"name":"University of New Hampshire"}]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[{"name":"University of New Hampshire"}]}],"member":"320","published-online":{"date-parts":[[2018,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951799"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5598-9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060501"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2902961.2903512"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"volume-title":"Proc. 2011 International Conference on Field-Programmable Technology. 1--8.","author":"Masle A. Le","key":"e_1_3_2_1_7_1","unstructured":"A. Le Masle , G. C. T. Chow , and W. Luk . 2011. Constant power reconfigurable computing . In Proc. 2011 International Conference on Field-Programmable Technology. 1--8. A. Le Masle, G. C. T. Chow, and W. Luk. 2011. Constant power reconfigurable computing. In Proc. 2011 International Conference on Field-Programmable Technology. 1--8."},{"volume-title":"Proc. IITC'05","author":"Nguyen V. H.","key":"e_1_3_2_1_8_1","unstructured":"V. H. Nguyen , P. Christie , A. Heringa , A. Kumar , and R. Ng . {n. d.}. An analysis of the effect of wire resistance on circuit level performance at the 45-nm technology node . In Proc. IITC'05 . 191--193. V. H. Nguyen, P. Christie, A. Heringa, A. Kumar, and R. Ng. {n. d.}. An analysis of the effect of wire resistance on circuit level performance at the 45-nm technology node. In Proc. IITC'05. 191--193."},{"volume-title":"2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE). 750--755","author":"O'Flynn C.","key":"e_1_3_2_1_9_1","unstructured":"C. O'Flynn and Z. David Chen . 2015. Side channel power analysis of an AES-256 bootloader . In 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE). 750--755 . C. O'Flynn and Z. David Chen. 2015. Side channel power analysis of an AES-256 bootloader. In 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE). 750--755."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2012.2223553"},{"volume-title":"Proc. 2008 IEEE\/ACM International Conference on Computer-Aided Design. 330--337","author":"Todri A.","key":"e_1_3_2_1_11_1","unstructured":"A. Todri , M. Marek-Sadowska , and J. Kozhaya . 2008. Power supply noise aware workload assignment for multi-core systems . In Proc. 2008 IEEE\/ACM International Conference on Computer-Aided Design. 330--337 . A. Todri, M. Marek-Sadowska, and J. Kozhaya. 2008. Power supply noise aware workload assignment for multi-core systems. In Proc. 2008 IEEE\/ACM International Conference on Computer-Aided Design. 330--337."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2034081"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J. Valamehr et al. 2012. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Springer Berlin Heidelberg 364--382.   J. Valamehr et al. 2012. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Springer Berlin Heidelberg 364--382.","DOI":"10.1007\/978-3-642-28368-0_24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488830"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2550460"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.241"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures","volume":"99","author":"Yu W.","year":"2017","unstructured":"W. Yu and S. Kose . 2017 . Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures . IEEE Transactions on Emerging Topics in Computing PP , 99 (2017), 1 -- 1 . W. Yu and S. Kose. 2017. Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures. IEEE Transactions on Emerging Topics in Computing PP, 99 (2017), 1--1.","journal-title":"IEEE Transactions on Emerging Topics in Computing PP"},{"key":"e_1_3_2_1_18_1","volume-title":"Luis Vega Gutierrez, and Michael Bedford Taylor","author":"Zhang Lu","year":"2016","unstructured":"Lu Zhang , Luis Vega Gutierrez, and Michael Bedford Taylor . 2016 . Power Side Channels in Security ICs: Hardware Countermeasures. Computing Research Repository (CoRR) abs\/1605.00681 (2016). arXiv:1605.00681 http:\/\/arxiv.org\/abs\/1605.00681 Lu Zhang, Luis Vega Gutierrez, and Michael Bedford Taylor. 2016. Power Side Channels in Security ICs: Hardware Countermeasures. Computing Research Repository (CoRR) abs\/1605.00681 (2016). arXiv:1605.00681 http:\/\/arxiv.org\/abs\/1605.00681"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2015.7273506"}],"event":{"name":"SLIP '18: System Level Interconnect Prediction Workshop","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CS"],"location":"San Francisco California","acronym":"SLIP '18"},"container-title":["Proceedings of the 20th System Level Interconnect Prediction Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3225209.3225212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3225209.3225212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:51Z","timestamp":1750210791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3225209.3225212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,23]]},"references-count":19,"alternative-id":["10.1145\/3225209.3225212","10.1145\/3225209"],"URL":"https:\/\/doi.org\/10.1145\/3225209.3225212","relation":{},"subject":[],"published":{"date-parts":[[2018,6,23]]},"assertion":[{"value":"2018-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}