{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:21:58Z","timestamp":1762003318141,"version":"build-2065373602"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342090","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:20:11Z","timestamp":1524525611000},"page":"648-653","source":"Crossref","is-referenced-by-count":11,"title":["Earthquake \u2014 A NoC-based optimized differential cache-collision attack for MPSoCs"],"prefix":"10.23919","author":[{"given":"Cezar","family":"Reinbrecht","sequence":"first","affiliation":[{"name":"Instituto de Inform\u00e1tica - PPGC - UFRGS, Porto Alegre, Brazil"}]},{"given":"Bruno","family":"Forlin","sequence":"additional","affiliation":[{"name":"Instituto de Inform\u00e1tica - PPGC - UFRGS, Porto Alegre, Brazil"}]},{"given":"Andreas","family":"Zankl","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Munich, Germany"}]},{"given":"Johanna","family":"Sepulveda","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]}],"member":"263","reference":[{"journal-title":"Cache-timing attacks on AES","year":"0","author":"bernstein","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/11894063_16","article-title":"Cache-collision timing attacks against aes","author":"bonneau","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2006"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/1128817.1128887","article-title":"A refined look at bernstein? aes side-channel analysis","author":"neve","year":"2006","journal-title":"Proceedings of the 2006 ACM Symposium on Information computer and communications security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.25"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","author":"daemen","year":"2002","journal-title":"The Design of Rijndael Secaucus"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923415"},{"journal-title":"White paper - big little technology The future of mobile","year":"0","key":"ref17"},{"journal-title":"Nios II Classic Processor Reference Guide","year":"0","author":"altera","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2015.7393301"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/i-Society16502.2010.6018719","article-title":"A practical differential power analysis attack against an FPGA implementation of AES cryptosystem","author":"masoomi","year":"2010","journal-title":"2010 International Conference on Information Society i-Society"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_10"},{"key":"ref6","first-page":"251","article-title":"Electromagnetic analysis: Concrete results","author":"gandolfi","year":"2001","journal-title":"CHES 2001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/11935308_9","article-title":"Trace-driven cache attacks on aes","author":"ac?i\u00e7mez","year":"2006","journal-title":"Proceedings of the 8th International Conference on Information and Communications Security"},{"key":"ref7","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","author":"kocher","year":"1996","journal-title":"CRYPTO'96"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Journal of Cryptology'99"},{"key":"ref1","first-page":"219","article-title":"The temperature side channel and heating fault attacks","author":"hutter","year":"2014","journal-title":"CARDIS 2013"},{"key":"ref9","first-page":"1","author":"osvik","year":"2006","journal-title":"Cache attacks and countermeasures The case of AES"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2014.7050033"},{"key":"ref22","first-page":"656","author":"spreitzer","year":"2013","journal-title":"On the applicability of time-driven cache attacks on mobile devices (extended version)"},{"key":"ref21","first-page":"271","article-title":"Cache based remote timing attack on the aes","author":"ac?i\u00e7mez","year":"2006","journal-title":"CT-RSA 2007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1450135.1450180"},{"key":"ref23","first-page":"76","article-title":"Collision attacks on processors with cache and countermeasures","author":"lauradoux","year":"2005","journal-title":"WEWoRC'05"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342090.pdf?arnumber=8342090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T19:47:39Z","timestamp":1661024859000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8342090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342090","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}