{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:53:56Z","timestamp":1769720036830,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338508.3359571","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis"],"prefix":"10.1145","author":[{"given":"Aur\u00e9lien","family":"Vasselle","sequence":"first","affiliation":[{"name":"eShard &amp; LIRMM, Pessac, France"}]},{"given":"Philippe","family":"Maurine","sequence":"additional","affiliation":[{"name":"LIRMM, Montpellier, France"}]},{"given":"Maxime","family":"Cozzi","sequence":"additional","affiliation":[{"name":"LIRMM, Montpellier, France"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"4th International Workshop","volume":"2523","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal , Bruce Archambeault , Josyula R. Rao , and Pankaj Rohatgi . 2002 . The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems -CHES 2002 , 4th International Workshop , Redwood Shores, CA, USA , August 13-15,2002, Revised Papers (Lecture Notes in Computer Science), Burton S. Kaliski Jr.,\u00c7etin Kaya Ko\u00e7, and Christ of Paar (Eds.), Vol. 2523 . Springer, 29--45. https:\/\/doi.org\/10.1007\/3-540-36400-5_4 10.1007\/3-540-36400-5_4 Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. 2002.The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems -CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15,2002, Revised Papers (Lecture Notes in Computer Science), Burton S. Kaliski Jr.,\u00c7etin Kaya Ko\u00e7, and Christ of Paar (Eds.), Vol. 2523. Springer, 29--45. https:\/\/doi.org\/10.1007\/3-540-36400-5_4"},{"key":"e_1_3_2_1_2_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Alam Monjur","year":"2018","unstructured":"Monjur Alam , Haider A. Khan , Moumita Dey , Nishith Sinha , Robert Locke Callan , Alenka G. Zajic , and Milos Prvulovic . 2018 . One&Done: A Single-Decryption EM-Based Attack on Open SSL's Constant-Time Blinded RSA . In 27th USENIX Security Symposium, USENIX Security 2018 , Baltimore, MD, USA , August 15-17, 2018.585--602. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/alam Monjur Alam, Haider A. Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, and Milos Prvulovic. 2018. One&Done: A Single-Decryption EM-Based Attack on Open SSL's Constant-Time Blinded RSA. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018.585--602. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/alam"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Josep Balasch Benedikt Gierlichs Oscar Reparaz and Ingrid Verbauwhede. 2015.DPA Bitslicing and Masking at 1 GHz See [14] 599--619. https:\/\/doi.org\/10.1007\/978-3-662-48324-4_30 10.1007\/978-3-662-48324-4_30","DOI":"10.1007\/978-3-662-48324-4_30"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Josep Balasch Benedikt Gierlichs Oscar Reparaz and Ingrid Verbauwhede. 2015.DPA Bitslicing and Masking at 1 GHz See [14] 599--619. https:\/\/doi.org\/10.1007\/978-3-662-48324-4_30","DOI":"10.1007\/978-3-662-48324-4_30"},{"key":"e_1_3_2_1_4_1","volume-title":"Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville","author":"Bogdanov Andrey","year":"2015","unstructured":"Andrey Bogdanov , Ilya Kizhvatov , Kamran Manzoor , Elmar Tischhauser , and Marc Witteman . 2015. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks . In Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville , NB, Canada, August 12-14, 2015 , Revised Selected Papers (Lecture Notes in Computer Science), Orr Dunkelman and Liam Keliher (Eds.), Vol. 9566 . Springer , 310--327. https:\/\/doi.org\/10.1007\/978-3-319-31301-6_19 10.1007\/978-3-319-31301-6_19 Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, and Marc Witteman. 2015. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. In Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (Lecture Notes in Computer Science), Orr Dunkelman and Liam Keliher (Eds.), Vol. 9566. Springer, 310--327. https:\/\/doi.org\/10.1007\/978-3-319-31301-6_19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02417-7"},{"key":"e_1_3_2_1_6_1","volume-title":"Cryptographic Hardware and Embedded Systems- CHES 2004: 6th International Workshop Cambridge","author":"Brier Eric","year":"2004","unstructured":"Eric Brier , Christophe Clavier , and Francis Olivier . 2004. Correlation PowerAnalysis with a Leakage Model . In Cryptographic Hardware and Embedded Systems- CHES 2004: 6th International Workshop Cambridge , MA, USA , August 11-13, 2004 . Proceedings (Lecture Notes in Computer Science), Marc Joye and Jean-Jacques Quisquater (Eds.), Vol. 3156 . Springer , 16--29. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2 10.1007\/978-3-540-28632-5_2 Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation PowerAnalysis with a Leakage Model. In Cryptographic Hardware and Embedded Systems- CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings (Lecture Notes in Computer Science), Marc Joye and Jean-Jacques Quisquater (Eds.), Vol. 3156. Springer, 16--29. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_7_1","unstructured":"Christian Cachin. 1997.Entropy measures and unconditional security in cryptography. Ph.D. Dissertation. ETH Zurich. http:\/\/d-nb.info\/950686247  Christian Cachin. 1997.Entropy measures and unconditional security in cryptography. Ph.D. Dissertation. ETH Zurich. http:\/\/d-nb.info\/950686247"},{"key":"#cr-split#-e_1_3_2_1_8_1.1","doi-asserted-by":"crossref","unstructured":"Suresh Chari Charanjit S. Jutla Josyula R. Rao and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks See [35] 398--412. https:\/\/doi.org\/10.1007\/3-540-48405-1_26 10.1007\/3-540-48405-1_26","DOI":"10.1007\/3-540-48405-1_26"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"Suresh Chari Charanjit S. Jutla Josyula R. Rao and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks See [35] 398--412. https:\/\/doi.org\/10.1007\/3-540-48405-1_26","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.123-148"},{"key":"e_1_3_2_1_10_1","volume-title":"COSADE 2018, Singapore, April 23-24,2018, Proceedings (Lecture Notes in Computer Science), Junfeng Fan and Benedikt Gierlichs (Eds.)","volume":"10815","author":"Cozzi Maxime","year":"2018","unstructured":"Maxime Cozzi , Jean Marc Galli\u00e8re , and Philippe Maurine . 2018 . Thermal Scans for Detecting Hardware Trojans. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop , COSADE 2018, Singapore, April 23-24,2018, Proceedings (Lecture Notes in Computer Science), Junfeng Fan and Benedikt Gierlichs (Eds.) , Vol. 10815 . Springer, 117--132. https:\/\/doi.org\/10.1007\/978-3-319-89641-0_7 10.1007\/978-3-319-89641-0_7 Maxime Cozzi, Jean Marc Galli\u00e8re, and Philippe Maurine. 2018. Thermal Scans for Detecting Hardware Trojans. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24,2018, Proceedings (Lecture Notes in Computer Science), Junfeng Fan and Benedikt Gierlichs (Eds.), Vol. 10815. Springer, 117--132. https:\/\/doi.org\/10.1007\/978-3-319-89641-0_7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2008.4674880"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"e_1_3_2_1_13_1","volume-title":"NIST non-invasive attacktesting workshop","author":"Gilbert Goodwill Benjamin Jun","unstructured":"Benjamin Jun Gilbert Goodwill , Josh Jaffe , Pankaj Rohatgi , 2011. A testing methodology for side-channel resistance validation . In NIST non-invasive attacktesting workshop , Vol. 7 . 115--136. Benjamin Jun Gilbert Goodwill, Josh Jaffe, Pankaj Rohatgi, et al.2011. A testing methodology for side-channel resistance validation. In NIST non-invasive attacktesting workshop, Vol. 7. 115--136."},{"key":"e_1_3_2_1_14_1","first-page":"48324","volume-title":"Saint-Malo","volume":"9293","author":"G\u00fcneysu Tim","year":"2015","unstructured":"Tim G\u00fcneysu and Helena Handschuh ( Eds .). 2015 . Cryptographic Hardware andEmbedded Systems - CHES 2015 - 17th International Workshop , Saint-Malo , France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science , Vol. 9293 . Springer. https:\/\/doi.org\/10.1007\/978-3-662- 48324 - 48324 10.1007\/978-3-662-48324-4 Tim G\u00fcneysu and Helena Handschuh (Eds.). 2015.Cryptographic Hardware andEmbedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science, Vol. 9293. Springer. https:\/\/doi.org\/10.1007\/978-3-662-48324-4"},{"key":"e_1_3_2_1_15_1","unstructured":"Keith Gutierrez and Gerald Coley. 2009. PCB Design Guidelines for 0.4mm Package-On-Package. Application Report SPRAAV1B. Texas Instruments. http:\/\/www.ti.com\/lit\/an\/spraav1b\/spraav1b.pdf Accessed Online (Sept. 2019).  Keith Gutierrez and Gerald Coley. 2009. PCB Design Guidelines for 0.4mm Package-On-Package. Application Report SPRAAV1B. Texas Instruments. http:\/\/www.ti.com\/lit\/an\/spraav1b\/spraav1b.pdf Accessed Online (Sept. 2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"CARDIS 2013","author":"Hutter Michael","year":"2013","unstructured":"Michael Hutter and J\u00f6rn-Marc Schmidt . 2013 . The Temperature Side Channel and Heating Fault Attacks. In Smart Card Research and Advanced Applications - 12thInternational Conference , CARDIS 2013 , Berlin, Germany , November 27-29, 2013.Revised Selected Papers (Lecture Notes in Computer Science), Aur\u00e9lien Francillon and Pankaj Rohatgi (Eds.), Vol. 8419. Springer, 219--235. https:\/\/doi.org\/10.1007\/978--3--319-08302--5_15 10.1007\/978--3--319-08302--5_15 Michael Hutter and J\u00f6rn-Marc Schmidt. 2013. The Temperature Side Channel and Heating Fault Attacks. In Smart Card Research and Advanced Applications - 12thInternational Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013.Revised Selected Papers (Lecture Notes in Computer Science), Aur\u00e9lien Francillon and Pankaj Rohatgi (Eds.), Vol. 8419. Springer, 219--235. https:\/\/doi.org\/10.1007\/978--3--319-08302--5_15"},{"key":"e_1_3_2_1_17_1","volume-title":"La cryptographie militaire.Journal des sciences militairesvol. IX (January and","author":"Kerckhoffs Auguste","year":"1883","unstructured":"Auguste Kerckhoffs . 1883. La cryptographie militaire.Journal des sciences militairesvol. IX (January and February 1883 ), 5--38 and 161--191. https:\/\/www.petitcolas.net\/kerckhoffs\/crypto_militaire_1_b.pdf Accessed Online (Sept . 2019). Auguste Kerckhoffs. 1883. La cryptographie militaire.Journal des sciences militairesvol. IX (January and February 1883), 5--38 and 161--191. https:\/\/www.petitcolas.net\/kerckhoffs\/crypto_militaire_1_b.pdf Accessed Online (Sept. 2019)."},{"key":"e_1_3_2_1_18_1","volume-title":"STBC:Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay. In2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017","author":"Kim Hyunmin","year":"2017","unstructured":"Hyunmin Kim , Seokhie Hong , Bart Preneel , and Ingrid Verbauwhede . 2017 . STBC:Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay. In2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017 , Bochum, Germany , July 3-5, 2017. IEEE Computer Society, 74--79. https:\/\/doi.org\/10.1109\/ISVLSI.2017.22 10.1109\/ISVLSI.2017.22 Hyunmin Kim, Seokhie Hong, Bart Preneel, and Ingrid Verbauwhede. 2017. STBC:Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay. In2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017, Bochum, Germany, July 3-5, 2017. IEEE Computer Society, 74--79. https:\/\/doi.org\/10.1109\/ISVLSI.2017.22"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the NISTPhysical Security Workshop","volume":"46","author":"Kocher Paul","year":"2005","unstructured":"Paul Kocher . 2005 . Design and validation strategies for obtaining assurance incounter measures to power analysis and related attacks . In Proceedings of the NISTPhysical Security Workshop , Vol. 46 . Paul Kocher. 2005. Design and validation strategies for obtaining assurance incounter measures to power analysis and related attacks. In Proceedings of the NISTPhysical Security Workshop, Vol. 46."},{"key":"e_1_3_2_1_20_1","unstructured":"Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom.2018. Spectre Attacks: Exploiting Speculative Execution.CoRRabs\/1801.01203(2018). arXiv:1801.01203 http:\/\/arxiv.org\/abs\/1801.01203  Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom.2018. Spectre Attacks: Exploiting Speculative Execution.CoRRabs\/1801.01203(2018). arXiv:1801.01203 http:\/\/arxiv.org\/abs\/1801.01203"},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis See [35] 388--397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25 10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis See [35] 388--397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_22_1","volume-title":"Schutz und Zuverl\u00e4ssigkeit. Konferenzb and der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), 2.-4.","author":"K\u00fchn Ulrich","year":"2008","unstructured":"Ulrich K\u00fchn , Andrei Pyshkin , Erik Tews , and Ralf-Philipp Weinmann . 2008. Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.In Sicherheit 2008: Sicherheit , Schutz und Zuverl\u00e4ssigkeit. Konferenzb and der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), 2.-4. April 2008 im Saarbr\u00fccker Schloss. (LNI), Ammar Alkassar and J\u00f6rg H. Siekmann(Eds.), Vol. 128 . GI , 97--109. Ulrich K\u00fchn, Andrei Pyshkin, Erik Tews, and Ralf-Philipp Weinmann. 2008. Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.In Sicherheit 2008: Sicherheit, Schutz und Zuverl\u00e4ssigkeit. Konferenzb and der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), 2.-4. April 2008 im Saarbr\u00fccker Schloss. (LNI), Ammar Alkassar and J\u00f6rg H. Siekmann(Eds.), Vol. 128. GI, 97--109."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.293-317"},{"key":"e_1_3_2_1_24_1","volume-title":"In27th USENIX Security Symposium, USENIX Security 2018","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In27th USENIX Security Symposium, USENIX Security 2018 , Baltimore,MD, USA , August 15-17, 2018.973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas,Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In27th USENIX Security Symposium, USENIX Security 2018, Baltimore,MD, USA, August 15-17, 2018.973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"e_1_3_2_1_25_1","volume-title":"Dan Page, and Michael Tunstall.","author":"Longo Jake","year":"2015","unstructured":"Jake Longo , Elke De Mulder , Dan Page, and Michael Tunstall. 2015 . SoC It to EM : Electro Magnetic Side-Channel Attacks on a Complex System-on-Chip, See [14],620--640. https:\/\/doi.org\/10.1007\/978-3-662-48324-4_31 10.1007\/978-3-662-48324-4_31 Jake Longo, Elke De Mulder, Dan Page, and Michael Tunstall. 2015. SoC It to EM: Electro Magnetic Side-Channel Attacks on a Complex System-on-Chip, See [14],620--640. https:\/\/doi.org\/10.1007\/978-3-662-48324-4_31"},{"key":"e_1_3_2_1_26_1","volume-title":"CARDIS 2011","author":"Medwed Marcel","year":"2011","unstructured":"Marcel Medwed , Christophe Petit , Francesco Regazzoni , Mathieu Renauld , and Fran\u00e7ois-Xavier Standaert . 2011 . Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks. In Smart Card Research and Advanced Applications - 10th IFIP WG 8.8\/11.2 International Conference , CARDIS 2011 , Leuven, Belgium , September 14-16, 2011, Revised Selected Papers (Lecture Notes in Computer Science), Emmanuel Prouff (Ed.), Vol. 7079. Springer, 115--132. https:\/\/doi.org\/10.1007\/978-3-642-27257-8_8 10.1007\/978-3-642-27257-8_8 Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and Fran\u00e7ois-Xavier Standaert. 2011. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks. In Smart Card Research and Advanced Applications - 10th IFIP WG 8.8\/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers (Lecture Notes in Computer Science), Emmanuel Prouff (Ed.), Vol. 7079. Springer, 115--132. https:\/\/doi.org\/10.1007\/978-3-642-27257-8_8"},{"key":"e_1_3_2_1_27_1","volume-title":"eMMC JTAG FBus. https:\/\/vr-table.com\/features.php Accessed Online (Sept","author":"Table COM.","year":"2019","unstructured":"Multi- COM. [n.d.]. VR- Table , eMMC JTAG FBus. https:\/\/vr-table.com\/features.php Accessed Online (Sept . 2019 ). Multi-COM. [n.d.]. VR-Table, eMMC JTAG FBus. https:\/\/vr-table.com\/features.php Accessed Online (Sept. 2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium, USENIX Security 16","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016., Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 565--581. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016., Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 565--581. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl"},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings (Lecture Notes in Computer Science), Isabelle Attali and Thomas P. Jensen (Eds.)","volume":"2140","author":"Quisquater Jean-Jacques","year":"2001","unstructured":"Jean-Jacques Quisquater and David Samyde . 2001 . Electro Magnetic Analysis(EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security , International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings (Lecture Notes in Computer Science), Isabelle Attali and Thomas P. Jensen (Eds.) , Vol. 2140 . Springer, 200--210. https:\/\/doi.org\/10.1007\/3-540-45418-7_17 10.1007\/3-540-45418-7_17 Jean-Jacques Quisquater and David Samyde. 2001. Electro Magnetic Analysis(EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings (Lecture Notes in Computer Science), Isabelle Attali and Thomas P. Jensen (Eds.), Vol. 2140. Springer, 200--210. https:\/\/doi.org\/10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_30_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Redini Nilo","year":"2017","unstructured":"Nilo Redini , Aravind Machiry , Dipanjan Das , Yanick Fratantonio , Antonio Bianchi , Eric Gustafson , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna .2017. Boot Stomp : On the Security of Boot loaders in Mobile Devices . In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017 ., Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 781--798. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/redini Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi,Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna.2017. Boot Stomp: On the Security of Boot loaders in Mobile Devices. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 781--798. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/redini"},{"key":"e_1_3_2_1_31_1","volume-title":"Mohamed Ramdani.","author":"Sicard Etienne","year":"2006","unstructured":"Etienne Sicard (eds.) Sonia Ben Dhia , Mohamed Ramdani. 2006 .Electromag-netic Compatibility of Integrated Circuits: Techniques for low emission and susceptibility(1 ed.). Springer US. http:\/\/gen.lib.rus.ec\/book\/index.php?md5=daff750da7c9e67635c190e9274becd7 Etienne Sicard (eds.) Sonia Ben Dhia, Mohamed Ramdani. 2006.Electromag-netic Compatibility of Integrated Circuits: Techniques for low emission and susceptibility(1 ed.). Springer US.http:\/\/gen.lib.rus.ec\/book\/index.php?md5=daff750da7c9e67635c190e9274becd7"},{"key":"e_1_3_2_1_32_1","unstructured":"Youssef Souissi. 2011.Optimization methods for side channel attacks. (M\u00e9thodes optimisant l'analyse des crypto processeurs sur les canaux cach\u00e9s). Ph.D. Dissertation. T\u00e9l\u00e9com Paris Tech France. https:\/\/tel.archives-ouvertes.fr\/pastel-00681665  Youssef Souissi. 2011.Optimization methods for side channel attacks. (M\u00e9thodes optimisant l'analyse des crypto processeurs sur les canaux cach\u00e9s). Ph.D. Dissertation. T\u00e9l\u00e9com Paris Tech France. https:\/\/tel.archives-ouvertes.fr\/pastel-00681665"},{"key":"e_1_3_2_1_33_1","volume-title":"International Journal of PoC||GTFO0x17 (December","author":"Spruyt Albert","year":"2017","unstructured":"Albert Spruyt and Niek Timmers . 2017. Constructing AES-CBC Shellcode . International Journal of PoC||GTFO0x17 (December 2017 ), 5--8.https:\/\/www.alchemistowl.org\/pocorgtfo\/pocorgtfo17.pdf Albert Spruyt and Niek Timmers. 2017. Constructing AES-CBC Shellcode. International Journal of PoC||GTFO0x17 (December 2017), 5--8.https:\/\/www.alchemistowl.org\/pocorgtfo\/pocorgtfo17.pdf"},{"key":"#cr-split#-e_1_3_2_1_34_1.1","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lien Vasselle Hugues Thiebeauld Quentin Maouhoub Adele Morisset and Sebastien Ermeneux. 2018. Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot. (2018). https:\/\/doi.org\/10.1109\/TC.2018.2860010 10.1109\/TC.2018.2860010","DOI":"10.1109\/TC.2018.2860010"},{"key":"#cr-split#-e_1_3_2_1_34_1.2","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lien Vasselle Hugues Thiebeauld Quentin Maouhoub Adele Morisset and Sebastien Ermeneux. 2018. Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot. (2018). https:\/\/doi.org\/10.1109\/TC.2018.2860010","DOI":"10.1109\/FDTC.2017.18"},{"key":"e_1_3_2_1_35_1","volume-title":"Wiener (Ed.)","author":"Michael","year":"1999","unstructured":"Michael J. Wiener (Ed.) . 1999 . Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science, Vol. 1666 . Springer .https:\/\/doi.org\/10.1007\/3-540-48405-1 10.1007\/3-540-48405-1 Michael J. Wiener (Ed.). 1999. Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science, Vol. 1666. Springer.https:\/\/doi.org\/10.1007\/3-540-48405-1"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338508.3359571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338508.3359571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:46Z","timestamp":1750203886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338508.3359571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":39,"alternative-id":["10.1145\/3338508.3359571","10.1145\/3338508"],"URL":"https:\/\/doi.org\/10.1145\/3338508.3359571","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}