{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:02:43Z","timestamp":1755907363148,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,12]]},"DOI":"10.1145\/3649476.3658778","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T12:29:41Z","timestamp":1718022581000},"page":"564-568","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2057-7435","authenticated-orcid":false,"given":"Tasnuva","family":"Farheen","sequence":"first","affiliation":[{"name":"University of Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0461-6533","authenticated-orcid":false,"given":"Sourav","family":"Roy","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5362-8393","authenticated-orcid":false,"given":"Andrew","family":"Cannon","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7718-0220","authenticated-orcid":false,"given":"Jia","family":"Di","sequence":"additional","affiliation":[{"name":"University of Arkansas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3752-2358","authenticated-orcid":false,"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2794-7320","authenticated-orcid":false,"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"volume-title":"2018 21st Euromicro Conference on Digital System Design.","author":"\u00a0al Anagnostopoulos","key":"e_1_3_2_1_1_1","unstructured":"et\u00a0al. Anagnostopoulos. [n. d.]. Low-temperature data remanence attacks against intrinsic SRAM PUFs. In 2018 21st Euromicro Conference on Digital System Design."},{"volume-title":"Design of Asynchronous Polymorphic Logic Gates for Hardware Security. In IEEE High Performance Extreme Computing Conference.","author":"\u00a0al Bernard","key":"e_1_3_2_1_2_1","unstructured":"et\u00a0al. Bernard. [n. d.]. Design of Asynchronous Polymorphic Logic Gates for Hardware Security. In IEEE High Performance Extreme Computing Conference."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323716"},{"key":"e_1_3_2_1_4_1","unstructured":"et\u00a0al. Claes. [n. d.]. Comparison of SRAM and FF PUF in 65nm technology. In Information Security Technology for Applications."},{"volume-title":"2012 19th IEEE International Conference on Electronics, Circuits, and Systems.","author":"\u00a0al Eiroa","key":"e_1_3_2_1_5_1","unstructured":"et\u00a0al. Eiroa. [n. d.]. Reducing bit flipping problems in SRAM physical unclonable functions for chip identification. In 2012 19th IEEE International Conference on Electronics, Circuits, and Systems."},{"volume-title":"d.]. Copker: A Cryptographic Engine Against Cold-Boot Attacks","author":"\u00a0al Guan","key":"e_1_3_2_1_6_1","unstructured":"et\u00a0al. Guan. [n. d.]. Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE Transactions on Dependable and Secure Computing ([n. d.])."},{"key":"e_1_3_2_1_7_1","volume-title":"Lest we remember: cold-boot attacks on encryption keys. Commun. ACM","author":"\u00a0al Halderman","year":"2009","unstructured":"et\u00a0al. Halderman. 2009. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM (2009)."},{"volume-title":"Proceedings of the 2013 ACM SIGSAC.","author":"\u00a0al Helfmeier","key":"e_1_3_2_1_8_1","unstructured":"et\u00a0al. Helfmeier. [n. d.]. Breaking and entering through the silicon. In Proceedings of the 2013 ACM SIGSAC."},{"key":"e_1_3_2_1_9_1","unstructured":"et\u00a0al. Hester. [n. d.]. Persistent clocks for batteryless sensing devices. ACM Transactions on Embedded Computing Systems ([n. d.])."},{"volume-title":"Workshop on Cryptographic Hardware and Embedded Systems.","author":"Andrew Huang","key":"e_1_3_2_1_10_1","unstructured":"Andrew Huang. [n. d.]. Keeping Secrets in Hardware: The Microsoft Xbox\u2122 Case Study. In Workshop on Cryptographic Hardware and Embedded Systems."},{"key":"e_1_3_2_1_11_1","unstructured":"et\u00a0al. Kai. [n. d.]. Security strategy of powered-off SRAM for resisting physical attack to data remanence. Journal of Semiconductors ([n. d.])."},{"key":"e_1_3_2_1_12_1","unstructured":"ST Microelectronics. [n. d.]. Protection against cold boot attacks. https:\/\/tails.net\/doc\/advancedtopics\/coldbootattacks\/index.en.html."},{"key":"e_1_3_2_1_13_1","unstructured":"ST Microelectronics. 2006. Design of asynchronous. https:\/\/www.st.com\/resource\/en\/application_note\/."},{"key":"e_1_3_2_1_14_1","unstructured":"et\u00a0al. M\u00fcller. [n. d.]. TRESOR Runs Encryption Securely Outside RAM. In USENIX."},{"key":"e_1_3_2_1_15_1","unstructured":"et\u00a0al. M\u00fcller. 2012. Forensic Recovery of Scrambled Telephones. (2012)."},{"volume-title":"2019 IEEE Custom Integrated Circuits Conference.","author":"\u00a0al Nagata","key":"e_1_3_2_1_16_1","unstructured":"et\u00a0al. Nagata. [n. d.]. On-chip physical attack protection circuits for hardware security. In 2019 IEEE Custom Integrated Circuits Conference."},{"key":"e_1_3_2_1_17_1","unstructured":"et\u00a0al. Neagu. [n. d.]. Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis. Microelectronics Journal ([n. d.])."},{"volume-title":"2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.","author":"\u00a0al Nedospasov","key":"e_1_3_2_1_18_1","unstructured":"et\u00a0al. Nedospasov. [n. d.]. Invasive PUF analysis. In 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography."},{"volume-title":"2018 IEEE Computer Society Annual Symposium on VLSI.","author":"\u00a0al Nevoral","key":"e_1_3_2_1_19_1","unstructured":"et\u00a0al. Nevoral. [n. d.]. CMOS gates with second function. In 2018 IEEE Computer Society Annual Symposium on VLSI."},{"key":"e_1_3_2_1_20_1","volume-title":"2018 IEEE 36th International Conference on Computer Design.","author":"\u00a0al Pan","year":"2018","unstructured":"et\u00a0al. Pan. 2018. Nvcool: When non-volatile caches meet cold boot attacks. In 2018 IEEE 36th International Conference on Computer Design."},{"key":"e_1_3_2_1_21_1","unstructured":"Patrick Simmons. [n. d.]. Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In Asia-Pacific Computer Systems."},{"key":"e_1_3_2_1_22_1","unstructured":"Sergei Skorobogatov. 2002. Low temperature data remanence in static RAM. Technical Report."},{"volume-title":"2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems.","author":"\u00a0al Srivastava","key":"e_1_3_2_1_23_1","unstructured":"et\u00a0al. Srivastava. [n. d.]. An efficient memory zeroization technique under side-channel attacks. In 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems."},{"volume-title":"Evolvable Systems: From Biology to Hardware: 4th International Conference, ICES.","author":"\u00a0al Stoica","key":"e_1_3_2_1_24_1","unstructured":"et\u00a0al. Stoica. [n. d.]. Polymorphic electronics. In Evolvable Systems: From Biology to Hardware: 4th International Conference, ICES."},{"key":"e_1_3_2_1_25_1","unstructured":"et\u00a0al. Tada. [n. d.]. Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks. Japanese Journal of Applied Physics ([n. d.])."},{"volume-title":"d.]. Probing attacks on integrated circuits: Challenges and research opportunities","author":"\u00a0al Wang","key":"e_1_3_2_1_26_1","unstructured":"et\u00a0al. Wang. [n. d.]. Probing attacks on integrated circuits: Challenges and research opportunities. IEEE Design & Test ([n. d.])."},{"volume-title":"2018 IEEE 27th Asian Test Symposium.","author":"\u00a0al Wu.","key":"e_1_3_2_1_27_1","unstructured":"et\u00a0al. Wu. [n. d.]. A dynamic-key secure scan structure against scan-based side channel and memory cold boot attacks. In 2018 IEEE 27th Asian Test Symposium."},{"volume-title":"d.]. Optimizating emerging nonvolatile memories for dual-mode applications: Data storage and key generator","author":"\u00a0al Zhang","key":"e_1_3_2_1_28_1","unstructured":"et\u00a0al. Zhang. [n. d.]. Optimizating emerging nonvolatile memories for dual-mode applications: Data storage and key generator. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ([n. d.])."},{"key":"e_1_3_2_1_29_1","unstructured":"et\u00a0al. Zhou. [n. d.]. MTNCL: An Ultra-Low Power Asynchronous Circuit Design Methodology. In Journal of Low Power Electronics and Applications."}],"event":{"name":"GLSVLSI '24: Great Lakes Symposium on VLSI 2024","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Clearwater FL USA","acronym":"GLSVLSI '24"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649476.3658778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T02:30:32Z","timestamp":1755829832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":29,"alternative-id":["10.1145\/3649476.3658778","10.1145\/3649476"],"URL":"https:\/\/doi.org\/10.1145\/3649476.3658778","relation":{},"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"2024-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}