{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:17:33Z","timestamp":1760098653855,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116420","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1043-1048","source":"Crossref","is-referenced-by-count":2,"title":["Towards Malicious Exploitation of Energy Management Mechanisms"],"prefix":"10.23919","author":[{"given":"Safouane","family":"NOUBIR","sequence":"first","affiliation":[{"name":"Universit&#x00E9; de Nant&#x00E9;s,Institut d&#x2019;&#x00C9;l&#x00E9;ctronique et de T&#x00E9;l&#x00E9;communications de Rennes (IETR), UMR CNRS 6164"}]},{"given":"Maria","family":"MENDEZ REAL","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Nant&#x00E9;s,Institut d&#x2019;&#x00C9;l&#x00E9;ctronique et de T&#x00E9;l&#x00E9;communications de Rennes (IETR), UMR CNRS 6164"}]},{"given":"Sebastien","family":"PILLEMENT","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Nant&#x00E9;s,Institut d&#x2019;&#x00C9;l&#x00E9;ctronique et de T&#x00E9;l&#x00E9;communications de Rennes (IETR), UMR CNRS 6164"}]}],"member":"263","reference":[{"year":"2017","key":"ref10","article-title":"White paper - the wannacry ransomware attack"},{"year":"0","key":"ref11","article-title":"Snapdragon 800 reference"},{"year":"0","key":"ref12","article-title":"Voltage and current regulator api"},{"year":"0","key":"ref13","article-title":"Magisk costum rom"},{"year":"2019","key":"ref14","article-title":"Download counts of magisk"},{"year":"2013","key":"ref4","article-title":"Arm white paper, big.little technology: The future of mobile"},{"year":"0","key":"ref3","article-title":"Exynos 5422 reference"},{"year":"0","key":"ref6","article-title":"Safetynet api documentation"},{"key":"ref5","first-page":"1057","article-title":"CLKSCREW: Exposing the perils of security-oblivious energy management","author":"tang","year":"2017"},{"year":"0","key":"ref8","article-title":"Fame, fault-attack awareness using microprocessor enhancements"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218624"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","article-title":"The sorcerer&#x2019;s apprentice guide to fault attacks","volume":"94","author":"bar-el","year":"2006","journal-title":"Proceedings of the IEEE"},{"article-title":"Computer architecture: A quantitative approach. morgan kaufmann publishersinc","year":"1990","author":"hennessy","key":"ref1"},{"key":"ref9","article-title":"Dvfs as a security failure of trustzone-enabled heterogeneous soc","author":"el mehdi benhani","year":"2018","journal-title":"25th IEEE International Conference on Electronics Circuits and Systems"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116420.pdf?arnumber=9116420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:47:54Z","timestamp":1659484074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116420","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}