{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:19Z","timestamp":1750219819158,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623999","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4208-1127","authenticated-orcid":false,"given":"Xhani Marvin","family":"Sa\u00df","sequence":"first","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8569-2020","authenticated-orcid":false,"given":"Thilo","family":"Krachenfels","sequence":"additional","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3494-0186","authenticated-orcid":false,"given":"Frederik Dermot","family":"Pustelnik","sequence":"additional","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5372-4825","authenticated-orcid":false,"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0202-1193","authenticated-orcid":false,"given":"Frank","family":"Altmann","sequence":"additional","affiliation":[{"name":"Fraunhofer IMWS, Halle, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Intel 600 Series Chipset Family Platform Controller Hub","author":"Intel","year":"2022","unstructured":"Intel 2022 . Intel 600 Series Chipset Family Platform Controller Hub . Intel. Rev. 004. Intel 2022. Intel 600 Series Chipset Family Platform Controller Hub. Intel. Rev. 004.","journal-title":"Intel. Rev. 004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00029"},{"key":"e_1_3_2_1_3_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Krachenfels Thilo","year":"2021","unstructured":"Thilo Krachenfels , Tuba Kiyan , Shahin Tajik , and Jean-Pierre Seifert . 2021 . Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 627--644. Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, and Jean-Pierre Seifert. 2021. Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 627--644."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE56030"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2014p0065"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2015.7129369"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300258"},{"key":"e_1_3_2_1_8_1","volume-title":"arXiv preprint arXiv:2302.06932","author":"Sa\u00df Marvin","year":"2023","unstructured":"Marvin Sa\u00df , Richard Mitev , and Ahmad-Reza Sadeghi . 2023. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. arXiv preprint arXiv:2302.06932 ( 2023 ). Marvin Sa\u00df, Richard Mitev, and Ahmad-Reza Sadeghi. 2023. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. arXiv preprint arXiv:2302.06932 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2015.10"},{"key":"e_1_3_2_1_10_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 75--90","author":"Selmke Bodo","year":"2021","unstructured":"Bodo Selmke , Emanuele Strieder , Johann Heyszl , Sven Freud , and Tobias Damm . 2021 . Breaking black box crypto-devices using laser fault injection . In International Symposium on Foundations and Practice of Security. Springer, 75--90 . Bodo Selmke, Emanuele Strieder, Johann Heyszl, Sven Freud, and Tobias Damm. 2021. Breaking black box crypto-devices using laser fault injection. In International Symposium on Foundations and Practice of Security. Springer, 75--90."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"e_1_3_2_1_12_1","volume-title":"Fill your boots: Enhanced embedded bootloader exploits via fault injection and binary analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"den Herrewegen Jan Van","year":"2021","unstructured":"Jan Van den Herrewegen , David Oswald , Flavio D Garcia , and Qais Temeiza . 2021. Fill your boots: Enhanced embedded bootloader exploits via fault injection and binary analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2021 ), 56--81. Jan Van den Herrewegen, David Oswald, Flavio D Garcia, and Qais Temeiza. 2021. Fill your boots: Enhanced embedded bootloader exploits via fault injection and binary analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 56--81."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1973009.1973111"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":13,"alternative-id":["10.1145\/3605769.3623999","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623999","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}