{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:41Z","timestamp":1759331861518,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"JST FOREST","award":["JPMJFR206L"],"award-info":[{"award-number":["JPMJFR206L"]}]},{"name":"JSPS KAKENHI","award":["JP23H03397"],"award-info":[{"award-number":["JP23H03397"]}]},{"name":"JST CREST","award":["JPMJCR19K5"],"award-info":[{"award-number":["JPMJCR19K5"]}]},{"name":"JSPS KAKENHI","award":["P23H00472"],"award-info":[{"award-number":["P23H00472"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623991","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"93-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-3595","authenticated-orcid":false,"given":"Hikaru","family":"Nishiyama","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9389-7977","authenticated-orcid":false,"given":"Daisuke","family":"Fujimoto","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1160-8156","authenticated-orcid":false,"given":"Yuichi","family":"Hayashi","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00015"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530054"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_1_4_1","volume-title":"CARDIS 2011","author":"Barbu Guillaume","year":"2011","unstructured":"Guillaume Barbu , Guillaume Duc , and Philippe Hoogvorst . 2011 . Java card operand stack: fault attacks, combined attacks and countermeasures. In Smart Card Research and Advanced Applications: 10th IFIP WG 8.8\/11.2 International Conference , CARDIS 2011 , Leuven, Belgium, September 14--16 , 2011, Revised Selected Papers 10. Springer, 297--313. Guillaume Barbu, Guillaume Duc, and Philippe Hoogvorst. 2011. Java card operand stack: fault attacks, combined attacks and countermeasures. In Smart Card Research and Advanced Applications: 10th IFIP WG 8.8\/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14--16, 2011, Revised Selected Papers 10. Springer, 297--313."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732206"},{"key":"e_1_3_2_1_10_1","volume-title":"BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection.. In WOOT.","author":"Cui Ang","year":"2017","unstructured":"Ang Cui and Rick Housley . 2017 . BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection.. In WOOT. Ang Cui and Rick Housley. 2017. BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection.. In WOOT."},{"key":"e_1_3_2_1_11_1","volume-title":"Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system. ACR Cryptology ePrint Archive (2012)","author":"Dehbaoui Amine","year":"2012","unstructured":"Amine Dehbaoui , Jean-Max Dutertre , Bruno Robisson , Philippe Orsatelli , Philippe Maurine , and Assia Tria . 2012b. Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system. ACR Cryptology ePrint Archive (2012) ( 2012 ). Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, Philippe Orsatelli, Philippe Maurine, and Assia Tria. 2012b. Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system. ACR Cryptology ePrint Archive (2012) (2012)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00010"},{"key":"e_1_3_2_1_14_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 439--444","author":"El-Baze David","year":"2016","unstructured":"David El-Baze , Jean-Baptiste Rigaud , and Philippe Maurine . 2016 . A fully-digital EM pulse detector. In 2016 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 439--444 . David El-Baze, Jean-Baptiste Rigaud, and Philippe Maurine. 2016. A fully-digital EM pulse detector. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 439--444."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137051"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.18"},{"key":"e_1_3_2_1_17_1","volume-title":"Piret and Quisquater's DFA on AES Revisited. Cryptology ePrint Archive","author":"Giraud Christophe","year":"2010","unstructured":"Christophe Giraud and Adrian Thillard . 2010. Piret and Quisquater's DFA on AES Revisited. Cryptology ePrint Archive ( 2010 ). Christophe Giraud and Adrian Thillard. 2010. Piret and Quisquater's DFA on AES Revisited. Cryptology ePrint Archive (2010)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3566097.3568352"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.18"},{"key":"e_1_3_2_1_21_1","volume-title":"Transient IEMI threats for cryptographic devices","author":"Homma Naofumi","year":"2012","unstructured":"Yu-ichi Hayashi, Naofumi Homma , Takaaki Mizuki , Takafumi Aoki , and Hideaki Sone . 2012. Transient IEMI threats for cryptographic devices . IEEE transactions on Electromagnetic Compatibility , Vol. 55 , 1 ( 2012 ), 140--148. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone. 2012. Transient IEMI threats for cryptographic devices. IEEE transactions on Electromagnetic Compatibility, Vol. 55, 1 (2012), 140--148."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.11"},{"key":"e_1_3_2_1_24_1","volume-title":"Dennis RE Gnad, and Mehdi B Tahoori","author":"Krautter Jonas","year":"2018","unstructured":"Jonas Krautter , Dennis RE Gnad, and Mehdi B Tahoori . 2018 . FPGAhammer: Remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2018), 44--68. Jonas Krautter, Dennis RE Gnad, and Mehdi B Tahoori. 2018. FPGAhammer: Remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 44--68."},{"key":"e_1_3_2_1_25_1","volume-title":"CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings 12","author":"Li Yang","year":"2010","unstructured":"Yang Li , Kazuo Sakiyama , Shigeto Gomisawa , Toshinori Fukunaga , Junko Takahashi , and Kazuo Ohta . 2010 . Fault sensitivity analysis. In Cryptographic Hardware and Embedded Systems , CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings 12 . Springer, 320--334. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta. 2010. Fault sensitivity analysis. In Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings 12. Springer, 320--334."},{"key":"e_1_3_2_1_26_1","volume-title":"Injecting software vulnerabilities with voltage glitching. arXiv preprint arXiv:1903.08102","author":"Yifan Lu.","year":"2019","unstructured":"Yifan Lu. 2019. Injecting software vulnerabilities with voltage glitching. arXiv preprint arXiv:1903.08102 ( 2019 ). Yifan Lu. 2019. Injecting software vulnerabilities with voltage glitching. arXiv preprint arXiv:1903.08102 (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2016.7841183"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256168"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2017.2766139"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_32_1","unstructured":"Colin O'Flynn. 2019. MIN () imum Failure: EMFI Attacks against USB Stacks.. In WOOT@ USENIX Security Symposium.  Colin O'Flynn. 2019. MIN () imum Failure: EMFI Attacks against USB Stacks.. In WOOT@ USENIX Security Symposium."},{"volume-title":"Introduction to Electromagnetic Compatibility","author":"Paul Clayton R","key":"e_1_3_2_1_33_1","unstructured":"Clayton R Paul . 1992. Introduction to Electromagnetic Compatibility . John Wiley & Sons . 301--308 pages. Clayton R Paul. 1992. Introduction to Electromagnetic Compatibility. John Wiley & Sons. 301--308 pages."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"Intentional electromagnetic interference (IEMI) and its impact on the US power grid","volume":"1","author":"Radasky William","year":"2010","unstructured":"William Radasky and Edward Savage . 2010 . Intentional electromagnetic interference (IEMI) and its impact on the US power grid . Meta , Vol. 1 (2010), 1 -- 3 . William Radasky and Edward Savage. 2010. Intentional electromagnetic interference (IEMI) and its impact on the US power grid. Meta , Vol. 1 (2010), 1--3.","journal-title":"Meta"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.22.142"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_15"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102471"},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX Security Symposium","volume":"2","author":"Tang Adrian","year":"2017","unstructured":"Adrian Tang , Simha Sethumadhavan , and Salvatore J Stolfo . 2017 . CLKSCREW: Exposing the perils of security-oblivious energy management .. In USENIX Security Symposium , Vol. 2 . 1057--1074. Adrian Tang, Simha Sethumadhavan, and Salvatore J Stolfo. 2017. CLKSCREW: Exposing the perils of security-oblivious energy management.. In USENIX Security Symposium, Vol. 2. 1057--1074."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.12"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11244082"},{"key":"e_1_3_2_1_42_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1--6.","author":"Zussa Loic","year":"2014","unstructured":"Loic Zussa , Amine Dehbaoui , Karim Tobich , Jean-Max Dutertre , Philippe Maurine , Ludovic Guillaume-Sage , Jessy Clediere , and Assia Tria . 2014 . Efficiency of a glitch detector against electromagnetic fault injection. In 2014 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1--6. Loic Zussa, Amine Dehbaoui, Karim Tobich, Jean-Max Dutertre, Philippe Maurine, Ludovic Guillaume-Sage, Jessy Clediere, and Assia Tria. 2014. Efficiency of a glitch detector against electromagnetic fault injection. In 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1--6."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2013.6604060"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":41,"alternative-id":["10.1145\/3605769.3623991","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623991","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}