{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:28Z","timestamp":1750220308959,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507756","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"1086-1098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Invisible bits: hiding secret messages in SRAM\u2019s analog domain"],"prefix":"10.1145","author":[{"given":"Jubayer","family":"Mahmod","sequence":"first","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Matthew","family":"Hicks","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Wikipedia Article. 2020. Key disclosure law. https:\/\/en.wikipedia.org\/wiki\/Safety_of_journalists"},{"key":"e_1_3_2_1_2_1","unstructured":"ASU. 2020. Predictive Technology Model (PTM). http:\/\/ptm.asu.edu\/"},{"key":"e_1_3_2_1_3_1","first-page":"3245","article-title":"Impact of NBTI aging on the single-event upset of SRAM cells","volume":"57","author":"Bagatin Marta","year":"2010","unstructured":"Marta Bagatin, Simone Gerardin, Alessandro Paccagnella, and Federico Faccio. 2010. Impact of NBTI aging on the single-event upset of SRAM cells. IEEE Transactions on Nuclear Science, 57, 6 (2010), 3245\u20133250.","journal-title":"IEEE Transactions on Nuclear Science"},{"key":"e_1_3_2_1_4_1","volume-title":"Artifice: A deniable steganographic file system. In 9th $USENIX$ Workshop on Free and Open Communications on the Internet ($FOCI$ 19).","author":"Barker Austen","year":"2019","unstructured":"Austen Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L Miller, and Darrell DE Long. 2019. Artifice: A deniable steganographic file system. In 9th $USENIX$ Workshop on Free and Open Communications on the Internet ($FOCI$ 19)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660313"},{"volume-title":"Presented as part of the 21st $USENIX$ Security Symposium ($USENIX$ Security 12). 129\u2013141.","author":"Bojinov Hristo","key":"e_1_3_2_1_6_1","unstructured":"Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, and Patrick Lincoln. 2012. Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In Presented as part of the 21st $USENIX$ Security Symposium ($USENIX$ Security 12). 129\u2013141."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_2_1_8_1","unstructured":"Nuvoton Technology Corporation. 2019. NuMicro\u00ae Family M2351 Series Datasheet. https:\/\/www.nuvoton.com\/export\/resource-files\/DS_M2351_Series_EN_Rev1.01.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Nuvoton Technology Corporation. 2020. NuMicro\u00ae Family M251\/M252 Series Datasheet. https:\/\/www.nuvoton.com\/export\/resource-files\/DS_M251_M252_Series_EN_Rev1.01.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Nuvoton Technology Corporation. 2020. NuMicro\u00ae Family M261\/M262\/M263 Series Datasheet. https:\/\/www.nuvoton.com\/export\/resource-files\/DS_M261_M262_M263_Series_EN_Rev1.02.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"CPJ. 2020. 10 Most Censored Countries. https:\/\/cpj.org\/reports\/2019\/09\/10-most-censored-eritrea-north-korea-turkmenistan-journalist\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024193"},{"key":"e_1_3_2_1_13_1","unstructured":"Renesas Electronics. 2019. Renesas Synergy\u2122 Platform Synergy Microcontrollers S1 Series. https:\/\/www.renesas.com\/us\/en\/document\/man\/s1ja-microcontroller-group-users-manual"},{"key":"e_1_3_2_1_14_1","volume-title":"Chinese border guards put secret surveillance app on tourists","author":"Guardian The","year":"2019","unstructured":"The Guardian. 2020. Chinese border guards put secret surveillance app on tourists\u2019 phones. https:\/\/www.theguardian.com\/world\/2019\/jul\/02\/chinese-border-guards-surveillance-app-tourists-phones"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2228886"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.68"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 8th Intl. Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec). 165\u2013179","author":"Holcomb Daniel E.","year":"2012","unstructured":"Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, and Kevin Fu. 2012. DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. In Proceedings of the 8th Intl. Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec). 165\u2013179."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36140-1_12"},{"key":"e_1_3_2_1_20_1","unstructured":"Texas Instruments. 2014. MSP430G2x53 Automotive Mixed-Signal Microcontrollers. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430g2553-q1.pdf?ts=1618423366624&ref_url=https%253A%252F%252Fwww.ti.com%252Fproduct%252FMSP430G2553-Q1"},{"key":"e_1_3_2_1_21_1","unstructured":"Texas Instruments. 2019. SimpleLink^TM ultra-low-power 32-bit Arm Cortex-M4F MCU With Precision ADC 256KB Flash and 64KB RAM. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp432p401r.pdf?ts=1604876136889&ref_url=https%253A%252F%252Fwww.ti.com%252Fproduct%252FMSP432P401R"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2007.896317"},{"volume-title":"Exploring the effect of device aging on static power analysis attacks","author":"Karimi Naghmeh","key":"e_1_3_2_1_24_1","unstructured":"Naghmeh Karimi, Thorben Moos, and Amir Moradi. 2019. Exploring the effect of device aging on static power analysis attacks. UMBC Faculty Collection."},{"key":"e_1_3_2_1_25_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Kiamehr Saman","year":"2017","unstructured":"Saman Kiamehr, Mohammad Saber Golanbari, and Mehdi B Tahoori. 2017. Leveraging aging effect to improve SRAM-based true random number generators. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. 882\u2013885."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00011"},{"key":"e_1_3_2_1_27_1","unstructured":"Robert R. King. 2019. North Koreans Want External Information But Kim Jong-Un Seeks to Limit Access. https:\/\/www.csis.org\/analysis\/north-koreans-want-external-information-kim-jong-un-seeks-limit-access"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855586"},{"key":"e_1_3_2_1_29_1","unstructured":"Heather Mahalik. 2020. 5 Questions That Will Unlock More Data with checkm8. https:\/\/www.cellebrite.com\/en\/blog\/iphone-extractions-5-questions-to-unlock-more-data\/"},{"key":"e_1_3_2_1_30_1","volume-title":"International Workshop on Information Hiding. 463\u2013477","author":"McDonald Andrew D","year":"1999","unstructured":"Andrew D McDonald and Markus G Kuhn. 1999. StegFS: A steganographic file system for Linux. In International Workshop on Information Hiding. 463\u2013477."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1146959"},{"key":"e_1_3_2_1_32_1","unstructured":"Microchip Technology Inc. 2020. SAM L10\/L11 Family: Ultra Low-Power 32-bit Cortex-M23 MCUs with TrustZone Crypto and Enhanced PTC."},{"key":"e_1_3_2_1_33_1","unstructured":"J Mull. 2012. How a Syrian refugee risked his life to bear witness to atrocities. Toronto Star Online posted."},{"key":"e_1_3_2_1_34_1","unstructured":"NXP Semiconductors. 2019. UM11126:LPC55S6x\/LPC55S2x\/LPC552x User manual."},{"key":"e_1_3_2_1_35_1","volume-title":"DEFY: A deniable, encrypted file system for log-structured storage.","author":"Peters Timothy M","year":"2015","unstructured":"Timothy M Peters, Mark A Gondree, and Zachary NJ Peterson. 2015. DEFY: A deniable, encrypted file system for log-structured storage."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Raspberry Pi Foundation. 2021. Raspberry Pi 3 Model B (v1.2). https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/","DOI":"10.1007\/978-1-4842-6510-9_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2836154"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421220"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-TSA.2013.6545621"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905176"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382151"},{"key":"e_1_3_2_1_42_1","unstructured":"Silicon Labs. 2012. EFM32 Wonder Gecko Family EFM32WG Data Sheet. https:\/\/www.silabs.com\/documents\/public\/data-sheets\/efm32wg-datasheet.pdf"},{"key":"e_1_3_2_1_43_1","first-page":"224","article-title":"Mobiflage: Deniable storage encryptionfor mobile devices","volume":"11","author":"Skillen Adam","year":"2013","unstructured":"Adam Skillen and Mohammad Mannan. 2013. Mobiflage: Deniable storage encryptionfor mobile devices. IEEE Transactions on Dependable and Secure Computing, 11, 3 (2013), 224\u2013237.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_44_1","unstructured":"Adam Skillen and Mohammad Mannan. 2013. On implementing deniable storage encryption for mobile devices."},{"key":"e_1_3_2_1_45_1","volume-title":"SECURWARE","author":"Srinivasan Avinash","year":"2014","unstructured":"Avinash Srinivasan, Jie Wu, Panneer Santhalingam, and Jeffrey Zamanski. 2014. DeadDrop-in-a-Flash: Information Hiding at SSD NAND Flash Memory Physical Layer. SECURWARE 2014, 79."},{"key":"e_1_3_2_1_46_1","unstructured":"STMicroelectronics. 2020. Ultra-low-power Arm\u00ae Cortex-M33 32-bit MCU+TrustZone\u00ae+FPU 165DMIPS up to 512KB Flash 256KB SRAM SMPS AES+PKA. https:\/\/www.st.com\/resource\/en\/datasheet\/stm32l562ce.pdf"},{"key":"e_1_3_2_1_47_1","unstructured":"TestEquity. 2020. Model 123H Temperature\/Humidity Chamber. https:\/\/www.testequity.com\/category\/Environmental-Chambers-Ovens\/Temperature-Humidity-Chambers\/TestEquity-123H-Temperature-Humidity-Chamber-North-America-Version-17267-1"},{"key":"e_1_3_2_1_48_1","unstructured":"B. Tudor Joddy Wang W. Liu and Hany Elhak. 2011. MOS Device Aging Analysis with HSPICE and CustomSim."},{"key":"e_1_3_2_1_49_1","volume-title":"TRIGON: Spies Passing in the Night. https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2016-featured-story-archive\/trigon-spies-passing-in-the-night.html","author":"United States of America Central Intelligence Agency.","year":"2016","unstructured":"United States of America Central Intelligence Agency. 2016. TRIGON: Spies Passing in the Night. https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2016-featured-story-archive\/trigon-spies-passing-in-the-night.html"},{"key":"e_1_3_2_1_50_1","unstructured":"United States of America Customs and Border Protection Agency. 2017. CBP Statement on Border Search of Electronic Devices. https:\/\/www.cbp.gov\/newsroom\/national-media-release\/cbp-releases-statistics-electronic-device-searches-0#wcm-survey-target-id"},{"key":"e_1_3_2_1_51_1","unstructured":"United States of America Customs and Border Protection Agency. 2019. CBP Statement on Border Search of Electronic Devices. https:\/\/www.cbp.gov\/newsroom\/speeches-and-statements\/cbp-statement-border-search-electronic-devices"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.26"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC48220.2019.8988383"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335710"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2009.5280814"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211890.3211906"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '22"},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:40Z","timestamp":1750191100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":57,"alternative-id":["10.1145\/3503222.3507756","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507756","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}