{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T08:37:34Z","timestamp":1769503054370,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","funder":[{"name":"National Natural Science Foundation of China","award":["62202288"],"award-info":[{"award-number":["62202288"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3725843.3756114","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:19:56Z","timestamp":1760721596000},"page":"111-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DExiM: Exposing Impedance-Based Data Leakage in Emerging Memories"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1635-3324","authenticated-orcid":false,"given":"Md Sadik","family":"Awal","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0010-6388","authenticated-orcid":false,"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2025. Alchitry Au. https:\/\/alchitry.com\/boards\/au. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_3_2","unstructured":"2025. CY15B102Q - FRAM. https:\/\/www.infineon.com\/cms\/en\/product\/memories\/f-ram-ferroelectric-ram\/cy15b102q-sxe\/. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_4_2","unstructured":"2025. CY15B104Q - FRAM. https:\/\/www.infineon.com\/cms\/en\/product\/memories\/f-ram-ferroelectric-ram\/cy15b104q-lhxi\/. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_5_2","unstructured":"2025. FM18W08 - FRAM. https:\/\/www.mouser.com\/datasheet\/2\/196\/Infineon_FM18W08_256_Kbit__32_K_8__Wide_Voltage_By-3361483.pdf. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_6_2","unstructured":"2025. FRAM MCU Key Strengths and Applications. https:\/\/www.fujitsu.com\/us\/imagesgig5\/FRAM_AppNote.pdf. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_7_2","unstructured":"2025. MB85AS4MT - ReRAM. https:\/\/download.mikroe.com\/documents\/datasheets\/MB85AS4MT.pdf. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_8_2","unstructured":"2025. MB85AS8MT - ReRAM. https:\/\/www.fujitsu.com\/jp\/group\/fsm\/en\/documents\/products\/reram\/lineup\/MB85AS8MT-DS501-00060-2v2-E.pdf. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_9_2","unstructured":"2025. MR4A16B - MRAM. https:\/\/www.mouser.com\/datasheet\/2\/144\/MR4A16B_Datasheet-1511254.pdf. [Accessed: 1 April 2025]."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Sinan Adibelli Prateek Juyal Luong\u00a0N Nguyen Milos Prvulovic and Alenka Zajic. 2020. Near-field backscattering-based sensing for hardware trojan detection. IEEE Transactions on Antennas and Propagation 68 12 (2020) 8082\u20138090.","DOI":"10.1109\/TAP.2020.3000562"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Ahmed\u00a0Izzat Alsalibi Mohd Khaled\u00a0Yousef Shambour Muhannad\u00a0A Abu-Hashem Mohammad Shehab Qusai Shambour and Riham Muqat. 2022. Nonvolatile memory-based Internet of Things: a survey. Artificial Intelligence-based Internet of Things Systems (2022) 285\u2013304.","DOI":"10.1007\/978-3-030-87059-1_11"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Dmytro Apalkov Bernard Dieny and Jon\u00a0M Slaughter. 2016. Magnetoresistive random access memory. Proc. IEEE 104 10 (2016) 1796\u20131830.","DOI":"10.1109\/JPROC.2016.2590142"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Yoshihiro Arimoto and Hiroshi Ishiwara. 2004. Current status of ferroelectric random-access memory. Mrs Bulletin 29 11 (2004) 823\u2013828.","DOI":"10.1557\/mrs2004.235"},{"key":"e_1_3_3_1_14_2","unstructured":"Md\u00a0Sadik Awal Buddhipriya Gayanath and Md\u00a0Tauhidur Rahman. 2024. Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.06242v1 (2024)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Md\u00a0Sadik Awal Arjuna Madanayake and Md\u00a0Tauhidur Rahman. 2022. Nearfield RF Sensing for Feature-Detection and Algorithmic Classification of Tamper Attacks. IEEE Journal of Radio Frequency Identification 6 (2022) 490\u2013499.","DOI":"10.1109\/JRFID.2022.3196662"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133318"},{"key":"e_1_3_3_1_17_2","unstructured":"Md\u00a0Sadik Awal and Md\u00a0Tauhidur Rahman. 2023. Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.03175 (2023)."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE56030.2022.10014924"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Taiwo\u00a0Oladipupo Ayodele. 2010. Types of machine learning algorithms. New advances in machine learning 3 19-48 (2010) 5\u20131.","DOI":"10.5772\/9385"},{"key":"e_1_3_3_1_20_2","volume-title":"CMOS: circuit design, layout, and simulation","author":"Baker R\u00a0Jacob","year":"2019","unstructured":"R\u00a0Jacob Baker. 2019. CMOS: circuit design, layout, and simulation. John Wiley & Sons."},{"key":"e_1_3_3_1_21_2","volume-title":"Network analyzer basics","author":"Ballo David","year":"1997","unstructured":"David Ballo. 1997. Network analyzer basics. Hewlett-Packard Company Microwave Instruments Division."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Writam Banerjee. 2020. Challenges and applications of emerging nonvolatile memory devices. Electronics 9 6 (2020) 1029.","DOI":"10.3390\/electronics9061029"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/1228784.1228803"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Jalil Boukhobza St\u00e9phane Rubini Renhai Chen and Zili Shao. 2017. Emerging NVM: A survey on architectural integration and research challenges. ACM Transactions on Design Automation of Electronic Systems (TODAES) 23 2 (2017) 1\u201332.","DOI":"10.1145\/3131848"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"An Chen. 2016. A review of emerging non-volatile memory (NVM) technologies and applications. Solid-State Electronics 125 (2016) 25\u201338.","DOI":"10.1016\/j.sse.2016.07.006"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Yangyin Chen. 2020. ReRAM: History Status and Future. IEEE Transactions on Electron Devices 67 4 (2020) 1420\u20131433. 10.1109\/TED.2019.2961505","DOI":"10.1109\/TED.2019.2961505"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Yun Chen Ali Hajiabadi Romain Poussier Yaswanth Tavva Andreas Diavastos Shivam Bhasin and Trevor\u00a0E Carlson. 2025. PARADISE: Criticality-aware instruction reordering for power attack resistance. ACM Transactions on Architecture and Code Optimization 22 1 (2025) 1\u201325.","DOI":"10.1145\/3701991"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Yuzong Chen Lu Lu Bongjin Kim and Tony Tae-Hyoung Kim. 2020. Reconfigurable 2T2R ReRAM architecture for versatile data storage and computing in-memory. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 12 (2020) 2636\u20132649.","DOI":"10.1109\/TVLSI.2020.3028848"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2016p0327"},{"key":"e_1_3_3_1_31_2","first-page":"57","volume-title":"International Conference on Smart Card Research and Advanced Applications","author":"Courbon Franck","year":"2016","unstructured":"Franck Courbon, Sergei Skorobogatov, and Christopher Woods. 2016. Reverse engineering flash EEPROM memories using scanning electron microscopy. In International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372."},{"key":"e_1_3_3_1_32_2","first-page":"145","volume-title":"2015 Design, Automation & Test in Europe Conference & Exhibition (DATE)","author":"Del\u00a0Pozo Santos\u00a0Merino","year":"2015","unstructured":"Santos\u00a0Merino Del\u00a0Pozo, Fran\u00e7ois-Xavier Standaert, Dina Kamel, and Amir Moradi. 2015. Side-channel attacks from static power: When should we care?. In 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 145\u2013150."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Samir\u00a0Ben Dodo Rajendra Bishnoi and Mehdi\u00a0B Tahoori. 2019. Secure STT-MRAM bit-cell design resilient to differential power analysis attacks. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 1 (2019) 263\u2013272.","DOI":"10.1109\/TVLSI.2019.2940449"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Richard Dorrance Fengbo Ren Yuta Toriyama Amr\u00a0Amin Hafez Chih-Kong\u00a0Ken Yang and Dejan Markovic. 2012. Scalability and design-space analysis of a 1T-1MTJ memory cell for STT-RAMs. IEEE Transactions on Electron Devices 59 4 (2012) 878\u2013887.","DOI":"10.1109\/TED.2011.2182053"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2023p0411"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Daisuke Fujimoto Shota Nin Yu-Ichi Hayashi Noriyuki Miura Makoto Nagata and Tsutomu Matsumoto. 2018. A demonstration of a HT-detection method based on impedance measurements of the wiring around ICs. IEEE Transactions on Circuits and Systems II: Express Briefs 65 10 (2018) 1320\u20131324.","DOI":"10.1109\/TCSII.2018.2858798"},{"key":"e_1_3_3_1_37_2","first-page":"262","volume-title":"International Workshop on Selected Areas in Cryptography","author":"Fumaroli Guillaume","year":"2010","unstructured":"Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, and Matthieu Rivain. 2010. Affine masking against higher-order side channel analysis. In International Workshop on Selected Areas in Cryptography. Springer, 262\u2013280."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICDT.2011.5783209"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Koichiro Honda Sunao Hashimoto and Yasuo Cho. 2006. Visualization of charges stored in the floating gate of flash memory by scanning nonlinear dielectric microscopy. Nanotechnology 17 7 (2006) S185.","DOI":"10.1088\/0957-4484\/17\/7\/S14"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2010.5470736"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/1016568.1016583"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08302-5_15"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.23919\/AE51540.2021.9542884"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Hiroshi Ishiwara. 2012. Ferroelectric random access memories. Journal of nanoscience and nanotechnology 12 10 (2012) 7619\u20137627.","DOI":"10.1166\/jnn.2012.6651"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2016.7684086"},{"key":"e_1_3_3_1_46_2","unstructured":"Ke Jiang Sen Deng Yinshuai Li Shuai Wang Tianwei Zhang and Yinqian Zhang. 2025. CipherGuard: Compiler-aided Mitigation against Ciphertext Side-channel Attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2502.13401 (2025)."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Erik\u00a0J Jorgensen Andrew Kacmarcik Milos Prvulovic and Alenka Zaji\u0107. 2022. Novel feature selection for non-destructive detection of hardware trojans using hyperspectral scanning. Journal of Hardware and Systems Security 6 1 (2022) 32\u201346.","DOI":"10.1007\/s41635-022-00127-7"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.14"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2012.68"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Kinam Kim and Dong\u00a0Jin Jung. 2011. Future memory technology and ferroelectric memory as an ultimate memory solution. Ferroelectrics: Applications (2011).","DOI":"10.5772\/18550"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544298"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"crossref","unstructured":"Takashi Kono Tomoya Saito and Tadaaki Yamauchi. 2018. Overview of embedded flash memory technology. Embedded Flash Memory for Embedded Systems: Technology Design for Sub-systems and Innovations (2018) 29\u201374.","DOI":"10.1007\/978-3-319-55306-1_3"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"crossref","unstructured":"Golnaz Korkian Daniel Le\u00f3n Francisco\u00a0J Franco Juan\u00a0C Fabero Manon Letiche Yolanda Morilla Pedro Mart\u00edn-Holgado Helmut Puchner Hortensia Mecha and Juan\u00a0A Clemente. 2022. Single event upsets under proton thermal and fast neutron irradiation in emerging nonvolatile memories. IEEE Access 10 (2022) 114566\u2013114585.","DOI":"10.1109\/ACCESS.2022.3217527"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"S\u00a0Dinesh Kumar and Himanshu Thapliyal. 2019. Exploration of non-volatile MTJ\/CMOS circuits for DPA-resistant embedded hardware. IEEE Transactions on Magnetics 55 12 (2019) 1\u20138.","DOI":"10.1109\/TMAG.2019.2943053"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368319"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"crossref","unstructured":"Sungkeun Lim Jiwei Fan and Alex\u00a0Q Huang. 2010. Transient-voltage-clamp circuit design based on constant load line impedance for voltage regulator module. IEEE Transactions on Industrial Electronics 57 12 (2010) 4085\u20134094.","DOI":"10.1109\/TIE.2010.2042419"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_31"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"crossref","unstructured":"Xiaoxuan Lou Tianwei Zhang Jun Jiang and Yinqian Zhang. 2021. A survey of microarchitectural side-channel vulnerabilities attacks and defenses in cryptography. ACM Computing Surveys (CSUR) 54 6 (2021) 1\u201337.","DOI":"10.1145\/3456629"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357125"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.5555\/1571643"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60910-8"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"crossref","unstructured":"Jagan\u00a0Singh Meena Simon\u00a0Min Sze Umesh Chand and Tseung-Yuen Tseng. 2014. Overview of emerging nonvolatile memory technologies. Nanoscale research letters 9 (2014) 1\u201333.","DOI":"10.1186\/1556-276X-9-526"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.5555\/1481541"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"crossref","unstructured":"Sanjay Mitra. 1999. A method of characterizing sense amplifier imbalance issues on a 2T2C FRAM\u00ae memory. Integrated Ferroelectrics 27 1-4 (1999) 325\u2013336.","DOI":"10.1080\/10584589908228478"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623092"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_16"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401542"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"crossref","unstructured":"Karthikeyan Nagarajan Farid\u00a0Uddin Ahmed Mohammad Nasim\u00a0Imtiaz Khan Asmit De Masud\u00a0H Chowdhury and Swaroop Ghosh. 2021. SecNVM: Power side-channel elimination using on-chip capacitors for highly secure emerging NVM. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 8 (2021) 1518\u20131528.","DOI":"10.1109\/TVLSI.2021.3087734"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","unstructured":"Luong\u00a0N. Nguyen Chia-Lin Cheng Milos Prvulovic and Alenka Zaji\u0107. 2019. Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 7 (2019) 1561\u20131574. 10.1109\/TVLSI.2019.2906547","DOI":"10.1109\/TVLSI.2019.2906547"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Luong\u00a0N Nguyen Chia-Lin Cheng Frank\u00a0T Werner Milos Prvulovic and Alenka Zajic. 2020. A comparison of backscattering EM and power side-channels and their performance in detecting software and hardware intrusions. Journal of Hardware and Systems Security 4 (2020) 150\u2013165.","DOI":"10.1007\/s41635-020-00093-y"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300127"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2012.6165062"},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"crossref","unstructured":"FY Osisanwo JET Akinsola O Awodele JO Hinmikaiye O Olakanmi J Akinjobi et\u00a0al. 2017. Supervised machine learning algorithms: classification and comparison. International Journal of Computer Trends and Technology (IJCTT) 48 3 (2017) 128\u2013138.","DOI":"10.14445\/22312803\/IJCTT-V48P126"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"crossref","unstructured":"Ju\u00a0Yong Park Duk-Hyun Choe Dong\u00a0Hyun Lee Geun\u00a0Taek Yu Kun Yang Se\u00a0Hyun Kim Geun\u00a0Hyeong Park Seung-Geol Nam Hyun\u00a0Jae Lee Sanghyun Jo et\u00a0al. 2023. Revival of ferroelectric memories based on emerging fluorite-structured ferroelectrics. Advanced Materials 35 43 (2023) 2204904.","DOI":"10.1002\/adma.202370312"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"crossref","unstructured":"Sk\u00a0Ziaur Rahaman Heng-Yuan Lee Yu-Sheng Chen Yu-De Lin Pang-Shiu Chen Wei-Su Chen and Pei-Hua Wang. 2017. Scalability and reliability issues of Ti\/HfOx-based 1T1R bipolar RRAM: Occurrence mitigation and solution. Applied Physics Letters 110 21 (2017).","DOI":"10.1063\/1.4983834"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_14"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"crossref","unstructured":"Sophiane Senni Lionel Torres Gilles Sassatelli and Abdoulaye Gamatie. 2016. Non-volatile processor based on MRAM for ultra-low-power IoT devices. ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 2 (2016) 1\u201323.","DOI":"10.1145\/3001936"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45163-1_11"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Carlton Shepherd Konstantinos Markantonakis Nico Van\u00a0Heijningen Driss Aboulkassimi Cl\u00e9ment Gaine Thibaut Heckmann and David Naccache. 2021. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Computers & Security 111 (2021) 102471.","DOI":"10.1016\/j.cose.2021.102471"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_11"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"crossref","unstructured":"Sergei Skorobogatov. 2018. Hardware security implications of reliability remanence and recovery in embedded memory. Journal of Hardware and Systems Security 2 4 (2018) 314\u2013321.","DOI":"10.1007\/s41635-018-0050-5"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Xavier Standaert. 2010. Introduction to side-channel attacks. Secure integrated circuits and systems (2010) 27\u201342.","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA47161.2019.8984802"},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_1"},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"crossref","unstructured":"Frank\u00a0T Werner Milos Prvulovic and Alenka Zaji\u0107. 2022. Detection of recycled ics using backscattering side-channel analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30 9 (2022) 1244\u20131255.","DOI":"10.1109\/TVLSI.2022.3190236"},{"key":"e_1_3_3_1_87_2","volume-title":"CMOS VLSI design: a circuits and systems perspective","author":"Weste Neil\u00a0HE","year":"2015","unstructured":"Neil\u00a0HE Weste and David Harris. 2015. CMOS VLSI design: a circuits and systems perspective. Pearson Education India."},{"key":"e_1_3_3_1_88_2","first-page":"6789","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wichelmann Jan","year":"2023","unstructured":"Jan Wichelmann, Anna P\u00e4tschke, Luca Wilke, and Thomas Eisenbarth. 2023. Cipherfix: Mitigating ciphertext { Side-Channel} attacks in software. In 32nd USENIX Security Symposium (USENIX Security 23). 6789\u20136806."},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2019.8825256"},{"key":"e_1_3_3_1_90_2","doi-asserted-by":"crossref","unstructured":"Rui Yang Haitong Li Kirby\u00a0KH Smithe Taeho\u00a0R Kim Kye Okabe Eric Pop Jonathan\u00a0A Fan and H-S\u00a0Philip Wong. 2019. Ternary content-addressable memory with MoS2 transistors for massively parallel data search. Nature Electronics 2 3 (2019) 108\u2013114.","DOI":"10.1038\/s41928-019-0220-7"},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.10"},{"key":"e_1_3_3_1_92_2","doi-asserted-by":"crossref","unstructured":"Shimeng Yu and Pai-Yu Chen. 2016. Emerging memory technologies: Recent trends and prospects. IEEE Solid-State Circuits Magazine 8 2 (2016) 43\u201356.","DOI":"10.1109\/MSSC.2016.2546199"},{"key":"e_1_3_3_1_93_2","doi-asserted-by":"crossref","unstructured":"XM Zeng Qing Liu Jing\u00a0Yun Tay Kai\u00a0Yang Chew J Cheah and Chee\u00a0Lip Gan. 2021. High resolution front-side visualization of charge stored in EEPROM with scanning nonlinear dielectric microscopy (SNDM). Nanotechnology 32 48 (2021) 485201.","DOI":"10.1088\/1361-6528\/ac1ebd"},{"key":"e_1_3_3_1_94_2","doi-asserted-by":"publisher","unstructured":"Xiao\u00a0Mei Zeng Qing Liu and Chee\u00a0Lip Gan. 2024. A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. IEEE Transactions on Information Forensics and Security 19 (2024) 1031\u20131040. 10.1109\/TIFS.2023.3327857","DOI":"10.1109\/TIFS.2023.3327857"},{"key":"e_1_3_3_1_95_2","doi-asserted-by":"crossref","unstructured":"Xiao\u00a0Mei Zeng Qing Liu Jing\u00a0Yun Tay and Chee\u00a0Lip Gan. 2022. Selective Staining on Non-Volatile Memory Cells for Data Retrieval. IEEE Transactions on Information Forensics and Security 17 (2022) 1884\u20131892.","DOI":"10.1109\/TIFS.2022.3172222"},{"key":"e_1_3_3_1_96_2","first-page":"109","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Zhang Qibo","year":"2024","unstructured":"Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, and Wenqiang Jin. 2024. Eye of Sauron:{ Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory { EM} Radiation. In 33rd USENIX Security Symposium (USENIX Security 24). 109\u2013126."},{"key":"e_1_3_3_1_97_2","doi-asserted-by":"crossref","unstructured":"Lianying Zhao He Shuang Shengjie Xu Wei Huang Rongzhen Cui Pushkar Bettadpur and David Lie. 2024. A Survey of Hardware Improvements to Secure Program Execution. Comput. Surveys 56 12 (2024) 1\u201337.","DOI":"10.1145\/3672392"},{"key":"e_1_3_3_1_98_2","unstructured":"Huifeng Zhu Haoqi Shan Dean Sullivan Xiaolong Guo Yier Jin and Xuan Zhang. 2023. PDNPulse: sensing PCB anomaly with the intrinsic power delivery network. IEEE Transactions on Information Forensics and Security (2023)."}],"event":{"name":"MICRO 2025: 58th IEEE\/ACM International Symposium on Microarchitecture","location":"Seoul Korea","acronym":"MICRO 2025","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 58th IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3725843.3756114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T21:41:32Z","timestamp":1769463692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3725843.3756114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":97,"alternative-id":["10.1145\/3725843.3756114","10.1145\/3725843"],"URL":"https:\/\/doi.org\/10.1145\/3725843.3756114","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}