{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:42:58Z","timestamp":1772044978599,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3240841","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Remote inter-chip power analysis side-channel attacks at board-level"],"prefix":"10.1145","author":[{"given":"Falk","family":"Schellenberg","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Dennis R. E.","family":"Gnad","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]},{"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Mehdi B.","family":"Tahoori","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/519625.828177"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"e_1_3_2_1_3_1","volume-title":"December 28","author":"Olarig Sompong P","year":"1999","unstructured":"Sompong P Olarig and Michael F Angelo. Method for the secure remote flashing of a BIOS memory, December 28 1999. US Patent 6,009,524."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133600"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_8_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, et al. Meltdown. arXiv preprint arXiv:1801.01207, 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"et al. Spectre Attacks: Exploiting Speculative Execution. arXiv preprint arXiv:1801.01203","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher, Daniel Genkin, Daniel Gruss, et al. Spectre Attacks: Exploiting Speculative Execution. arXiv preprint arXiv:1801.01203, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339242"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2650280.2650362"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.60"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342177"},{"key":"e_1_3_2_1_14_1","first-page":"0","volume-title":"Zhao and G Edward Suh. FPGA-Based Remote Power Side-Channel Attacks. In Symposium on Security and Privacy (S&P)","author":"Mark","unstructured":"Mark Zhao and G Edward Suh. FPGA-Based Remote Power Side-Channel Attacks. In Symposium on Security and Privacy (S&P), page 0. IEEE, May 2018."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241272"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831198"},{"key":"e_1_3_2_1_19_1","first-page":"2","volume-title":"Wray. An Analysis of Covert Timing Channels. In IEEE Symposium on Security and Privacy","author":"John","year":"1991","unstructured":"John C. Wray. An Analysis of Covert Timing Channels. In IEEE Symposium on Security and Privacy, pages 2--7, 1991."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.79"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2016.7929182"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435264.2435283"},{"key":"e_1_3_2_1_24_1","unstructured":"Side-channel AttacK User Reference Architecture. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/index.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2007.373462"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2669025"}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","location":"San Diego California","acronym":"ICCAD '18","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"]},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:33Z","timestamp":1750208253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":26,"alternative-id":["10.1145\/3240765.3240841","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3240841","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}