<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Paolo Prinetto</string-name>
          <email>paolo.prinetto@polito.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gianluca Roascio</string-name>
          <email>gianluca.roascio@polito.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybersecurity National Laboratory, Consorzio Interuniversitario Nazionale per l'Informatica Dipartimento di Automatica e Informatica, Politecnico di Torino</institution>
          ,
          <addr-line>Turin</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Information Systems, increasingly present in a world that goes towards complete digitalisation, can be seen as complex systems at the base of which is the hardware. When dealing with the security of these systems to stop possible intrusions and malicious uses, the analysis must necessarily include the possible vulnerabilities that can be found at the hardware level, since their exploitation can make all defences implemented at web or software level ine ective. In this paper, we propose a meaningful and comprehensive taxonomy for the vulnerabilities a ecting the hardware and the attacks that exploit them to compromise the system, also giving a de nition of Hardware Security, in order to clarify a concept often confused with other domains, even in the literature.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>work, the applications need services provided by the system software (typically the Operating
System), which in turn is the last virtualisation layer on top of the hardware. \Hardware" is
a vague concept, being it often given di erent interpretations and meanings, as a consequence
of the peculiar points of view of di erent stakeholders, including end-users, providers, OEMs,
manufacturers, designers, etc. In the sequel, the term hardware is used to collectively refer to
the whole set of electronic devices used to set-up an Information System, Information
Technology (IT) or Operational Technology (OT) indi erently, regardless its complexity, its eld of
application, and the functionality/role of the devices within it.</p>
      <p>USER
    WEB /
COMMUNICATION</p>
      <p>
        From the security point of view, any component of any Information System layer may have
weaknesses that can generate vulnerabilities. The MITRE Corporation2 de nes a vulnerability
as a weakness present inside a component of an information system that, \when exploited,
results in a negative impact to Con dentiality, Integrity, OR Availability " [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Anything that
endangers at least one of the three aspects of the CIA triad makes the system vulnerable, i.e.,
not completely secure.
      </p>
      <p>When a component of one of the layers is compromised by an attack, either the lower
layer provides protection, and thus the intrusion is stopped, or it is compromised as well, and
the attacker can use it maliciously. It is therefore clear that the base of the layer stack, the
hardware, plays a primary role in Information System security: it represents, by construction,
the last line of defense against intrusions [7, Section 4.1]. Directly or indirectly being the base
all the other layers rely on, if attacked, it may render useless all the defences implemented in
the upper layers.</p>
      <p>The presence of hardware vulnerabilities has thus an obvious impact on the Information
System security, but this is not the only role that hardware plays in its security. We can,
in fact, identify three di erent areas to consider, as shown in Figure 2: Hardware Security,
Hardware-based Security, and Hardware Trust.</p>
      <p>Hardware Security refers to all the actions needed to (i) identify hardware vulnerabilities, (ii)
analyse their e ects, (iii) prevent their exploitations by mitigating, reducing, and (ideally)
making null the risks induced by their presence, (iv) develop and implement protections
and remediation solutions, and (v) possibly avoid them by proper remediations during
the design and production phases (Security-by-Design). Note that this de nition is in no
way constrained on where or when what described above can be done. For example, the
fact that the vulnerabilities be located in the hardware and that the hardware attacks
try to open breaches through them to compromise the security of the system, does not
necessarily mean that the defences against them must be implemented at the hardware
level. This would be extremely limiting, since most vulnerabilities are discovered once
the hardware is already operating in the eld, without the possibility of being patched, as
it can mostly be done for software. Therefore, any technique aimed at counter hardware
attacks falls under the de nition of Hardware Security, even if mitigations are applied at
the upper layers.</p>
      <p>Hardware-based Security refers to all the solutions aimed at resorting to hardware to
protect the system from attacks that exploit vulnerabilities present in other components of
the system.</p>
      <p>Hardware Trust refers to minimising the risks introduced by hardware counterfeiting, thus
guaranteeing the other components of the system about the authenticity of the used
hardware devices.</p>
      <p>HARDWARE
SECURITY</p>
      <p>HARDWARE</p>
      <p>BASED</p>
      <p>SECURITY
HARDWARE
HARDWARE</p>
      <p>TRUST</p>
      <p>In the sequel of this paper, we shall zoom on Hardware Security, only, presenting a taxonomy
of both vulnerabilities a ecting the hardware and of the attacks targeting it. Section 2
contextualises the paper and shows some previous attempts to systematise the topic; then, Section 3
classi es hardware vulnerabilities, Section 4 presents hardware attacks and, eventually, Section
5 concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>State of the Art</title>
      <p>
        Since Information Systems began to spread and evolve, the topic of security has always been
mainly addressed in relation to the protection from intrusions made possible by their web
connections, i.e., in an environment potentially open to anyone. It is therefore a fact that
networks and software have received the most of the attention, while hardware has traditionally
been considered as secure and inviolable. On the other hand, the role of hardware components
in safety and in safety-critical applications have been deeply investigated [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]: it was commonly
believed that hardware could at most fail, but not be attacked.
      </p>
      <p>
        At the end of the last century, smart cards were already di used. Based on chips specialized
in security and authentication applications, these devices were considered impossible to crack
if not with very advanced means, out of the possibility of common hackers. But starting from
1996, this thesis started to be dismantled through demonstrations, for the rst time, of fault
injection attacks or microprobing experiments carried out with common equipment against
these chips [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and the problem began to be slowly acknowledged.
      </p>
      <p>
        In the same years or a little later, important authors such as Kocher [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] and others [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ]
[
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] began to raise the problem of extrapolating information from secure devices such as smart
cards simply by listening to the surrounding environment, e.g., by measuring the time taken,
the energy consumed, the radiation emitted. Cryptographic algorithms, considered practically
impossible to break mathematically, are instead vulnerable in their physical implementations.
This was how the so-called side-channel attacks started to be known.
      </p>
      <p>
        At the beginning of the century, the vertical integration model in the hardware supply chain
was abandoned in favor of the horizontal one: instead of taking care of all stages of production,
from speci cations to nal manufacture, companies started to outsource manufacturing to
thirdparty companies, to which the layout of their devices is delivered. Therefore, the community
started to reason about the possible risks of counterfeiting and piracy deriving from this, with a
rst article in 2001 by Koushanfar et al. [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. The issue was even raised years later by the United
States Congress [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Thus, a whole literature has been produced on the so-called hardware
metering [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] and its implementation methods, including Physical Unconable Functions (PUFs)
[
        <xref ref-type="bibr" rid="ref40">40</xref>
        ] or circuit obfuscation [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]. Similarly, a manufacturing process that includes untrusted actors
started to raise doubts about the possibility of inclusion of hardware Trojan horses [
        <xref ref-type="bibr" rid="ref55">55</xref>
        ], i.e.,
Trojans inserted directly into the circuit, to be activated once the device is put into operation.
      </p>
      <p>The concept of security related to hardware is therefore a young concept, and it may seem
in itself a spurious union of techniques for protecting sometimes the originality and the integrity
of the hardware design, sometimes the information itself treated by the hardware. Only in more
recent years, some authors have tried to tidy up by proposing examples of taxonomies, among
which we report here the most signi cant according to our opinion.</p>
      <p>
        In a paper of 2014, Rostami et al. [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ] distinguish, within the sphere of Hardware Security,
5 major issues: Hardware Trojans, Reverse Engineering of the design, Intellectual-Property
Piracy, Side-Channel Attacks and Hardware Counterfeiting. It is a classi cation that confuses
vulnerabilities, types of attacks and purposes of attacks, since, for example, many
reverseengineering attacks are certainly performed to steal the intellectual property of a circuit, while
Trojans are to be considered rather as vulnerabilities, triggered later by an attack, but they are
not properly an attack category.
      </p>
      <p>
        In the same year, Hamdioui et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] tried to classify attacks in attacks to data (e.g.,
Sidechannel attacks), attacks to design (e.g., reverse-engineering attacks) and attacks to
functionality, with three modes in the context of attacks to data: invasive, non-invasive, or semi-invasive
with respect to the physical device itself, a very important concept that will be discussed later
in the paper.
      </p>
      <p>
        In their handbook published in 2018 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], Bhunia and Tehranipoor well explain problems
related to security of hardware components with many practical examples, without much re
ning the taxonomy of Rostami's 2014 article, but adding a fundamental distinction of the overall
problem in two wide families: (i) attacks targeting hardware with their countermeasures, and
(ii) attacks targeting the system with their hardware-based countermeasures, i.e., what we have
respectively called Hardware Security and Hardware-based Security in the previous Section.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Hardware Vulnerabilities Taxonomy</title>
      <p>The proposed taxonomy of hardware vulnerabilities is shown in Figure 3. Vulnerabilities are
rst clustered according to their nature and their domain, in turns into di erent criteria.</p>
      <p>HARDWARE VULNERABILITIES
nature</p>
      <p>domain
unintentional
intentional
logical</p>
      <p>physical
bug
flaw</p>
      <p>backdoor</p>
      <p>The nature may be intentional or unintentional , i.e., the vulnerability may be introduced
into the device voluntarily or not during its design and production phases. Unintentional
vulnerabilities are further split into bugs and aws.</p>
      <p>A bug is an inconsistency between a speci cation and its actual implementation, introduced
by a mistake during a speci c design phase which is not detected during the subsequent V&amp;V
(Validation and Veri cation) phase.</p>
      <p>
        A aw is, instead, a non-primary feature that does not constitute an inconsistency w.r.t.
the specs, and that is the result of a misconception of the designer who did not take into
consideration its potential dangerousness. A aw di ers from a bug, being not colliding with
any speci cation. As an example, in the design of modern microprocessors, the need to optimize
performance through speculative execution and aggressive caching caused aws such as the
famous Meltdown [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] and Spectre [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]: such vulnerabilities were not born by a mistake made
by the designer, but unintentionally introduced during the optimisation phase, without taking
into account the risks that those race conditions could have led to.
      </p>
      <p>
        A vulnerability inserted intentionally inside a hardware device can be referred to as a
backdoor, as the person who inserts them wants to guarantee her/himself (or someone else) the
possibility of a later access or misuse that is outside the set of intended use-cases. Note that
the presence of a backdoor exposes the hardware component to threats independently of the
fact it was inserted maliciously or not. From the one hand, an example of malicious backdoor
is a Hardware Trojan [
        <xref ref-type="bibr" rid="ref55">55</xref>
        ], i.e., a rogue piece of circuitry inserted at a given point of the design
and production phases, which can carry out unauthorised actions when its \triggering"
conditions are satis ed. As already said, with the globalization of Integrated-Circuit (IC) design
and manufacturing, the outsourcing of production task has become a common way to lower the
product's cost. Embedded hardware devices are not always produced by the companies that
design and sell them, nor in the same country where they will be used. A malicious intruder
with access to the manufacturing process can introduce some changes to the nal product. A
Hardware Trojan is characterized by a payload, i.e. the entire activity that the Trojan
executes when it is activated, and by a trigger which is the condition veri ed in the state of the
circuit that activates the payload. In general, malicious Trojans try to bypass or disable the
security fence of a system, they can leak con dential information by radio emission or by other
side-channel signal. A Trojan can also be used to disable, derange or destroy the entire chip or
components of it. A Trojan can be introduced during any production step (design, fabrication,
test, assembly) and at any level (register-transfer level, gate level, transistor level and even
physical level).
      </p>
      <p>
        From the other hand, an example of non-malicious backdoors is provided by the
undocumented instructions of some processors belonging to x86 family, such as the one presented
in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]: the undocumented opcode ALTINST (0x0F3F), most likely originally introduced by the
designers for debugging purposes, allows the user to switch to an alternative ISA (Instruction
Set Architecture), closer to the actual inner RISC architecture, and it can be used maliciously
to mount a privilege escalation attack.
      </p>
      <p>Orthogonally to its nature, a hardware vulnerability belongs to a domain, either logical
or physical. A hardware vulnerability is logical when it has been introduced during the early
design phases of the device, whereas it is physical when it is related to vulnerabilities introduced
during the latest technology-mapping steps of the design process.</p>
      <p>
        A typical example is here provided by the fact that a series of consecutive write operations
into a DRAM memory cell (row hammering ) can induce adjacent cells to ip their content,
due to an electric leakage e ects [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Such a vulnerability is in fact intrinsic to the technology
adopted for implementing the memory, even if an accurate analysis of the well known linked
dynamic faults in DRAM [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] could suggest proper remediation at the design time.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Hardware Attacks Taxonomy</title>
      <p>For the very meaning of the term, a vulnerability is not such if it cannot be exploited, because it
would not expose the system to any risk, so it would not constitute any weakness. The exploit
is the mean or method of taking advantage of a vulnerability for malicious purposes. Therefore,
a hardware attack can be de ned as the act of taking advantage of a hardware vulnerability.</p>
      <p>It is important to clearly point out that an attack always happens just when the hardware
a ected by a vulnerability is operating in the eld: modifying a design to introduce a backdoor
is a vulnerability insertion, while exploiting it is an attack.</p>
      <p>Moreover, if the presence of a vulnerability jeopardises Con dentiality, Integrity or
Availability (Section 3), and if the vulnerability is such only if it is exploitable, then an attack, using
an exploit, is by de nition an action that puts at risk the Con dentiality, the Integrity or the
Availability of an asset, and therefore everything that does not impact on any of these three
properties is outside the de nition of attack.</p>
      <p>The taxonomy for hardware attacks is summarised in Figure 4.</p>
      <p>
        A hardware attack is rst classi ed by the goal for which it is launched. The goal is the
malicious action that the attacker wants to take against an asset of the attacked hardware,
de ned as a target. The target can be the information that the hardware is treating, but
also a property of the hardware itself, either functional or non-functional [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. One can launch
an attack to:
steal a target (e.g., a cryptographic key, a secret password, an intellectual property, a resource,
etc.); referring to the CIA triad, stealing is an action carried out in violation of Con
dentiality, since the attacker takes possession of an asset of which she/he does not own the
      </p>
      <p>HARDWARE ATTACKS
goal
target
domain
modality
steal
corrupt inhibit
information
property
logical physical
invasive</p>
      <p>non-invasive
passive active
rights of access or use. It worths pointing out that the so called intellectual property (IP)
theft is to be considered as a case of IP-piracy attack, and related solutions are demanded
to Hardware Security. Intellectual property is in fact a full- edged target according to
the de nition given in Section 4, and therefore it should be protected exactly as any other
hardware asset;
corrupt a target (e.g., a memory word, a permission le, a functionality to make it folded to
one's advantage, etc.); corrupting is an action carried out in violation of Integrity, since
the attacker modi es an asset without being authorised to do it;
inhibit a target (e.g., a service, a set of critical data, a defense mechanism, etc.); inhibiting
is an action carried out in violation of Availability, since the attacker prevents an asset
from being properly accessed or used by those who hold rights to do that.</p>
      <p>
        As well as vulnerabilities, hardware attacks always have a domain in which they are
implemented. An attack belongs to the logical domain if it is implemented starting from upper
layers with respect to hardware (Figure 1), i.e., when a hardware vulnerability, logical or
physical, is exploited through actions not directly on the hardware itself, but on the software levels
running on top of it. This domain includes, for example, privilege escalation attacks
exploiting the row-hammer vulnerability [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] [
        <xref ref-type="bibr" rid="ref56">56</xref>
        ], or those that exploit vulnerabilities in processor
microarchitecture such as Meltdown [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ], Spectre [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] or others [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] [
        <xref ref-type="bibr" rid="ref47">47</xref>
        ] [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], and also
cache-based attacks [
        <xref ref-type="bibr" rid="ref58">58</xref>
        ] [
        <xref ref-type="bibr" rid="ref48">48</xref>
        ].
      </p>
      <p>An attack belongs instead to the physical domain if it is implemented through actions
directly performed on the attacked hardware device.</p>
      <p>
        Finally, a hardware attack is quali ed depending on the modality in which it is carried out.
The attack is invasive when the actions taken against the attacked hardware includes physical
intrusions such as desoldering, depackaging, disconnection of its internal components. Attacks
having this modality are, for example:
• Microprobing Attacks: A microprobing attack tries to extract information by
measuring electrical quantities directly on the silicon die of the target device, once obtained
physical access to it. The die exposition is usually achieved by removing the plastic
packages via chemical etching and/or by mechanical approaches. When possible, attackers
study the netlist of the target before the attack, so with little reverse engineering they
are able to nd matches with the layout in order to locate connection carrying sensible
data. At this point, thank to advanced equipment as Focused Ion Beam (FIB) generators,
they can obstruct wires with nanometric precision, or create conductive paths that serve
as electrical probe contact in a further moment. A probe equipment is then employed
to read the target signals and extract information. Such sophisticated equipment seems
di cult to obtain commonly, but for example a FIB generator can be rented for just a
couple hundred dollars per hour, which is reasonable with respect to an information theft
that could be highly rewarding [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ] [
        <xref ref-type="bibr" rid="ref52">52</xref>
        ].
• Reverse Engineering Attacks: An attack of reverse engineering is similar to
microprobing with respect to mounting phase (desoldering and decapsulation), but actually
has a di erent scope. It in fact aims at understanding the structure of a semiconductor
device and its functions, i.e., at stealing the intellectual properties of the designer. A
deep knowledge and expertise on advance IC design are obviously required to succeed.
All the layers formed during chip fabrication are removed one-by-one in reverse order and
photographed to determine the internal structure of the chip. At the end, by processing
all the acquired information, a standard netlist le can be created and used to simulate
and eventually redesign the target device [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
• Data Remanence Attacks: Computers typically store secret data in DRAM, properly
de-powered when the device is tampered with. It is common to think that once the power
is down, the content of volatile memories is erased (this is why they are called volatile,
actually). Although, it has been proved that the charge stored in a DRAM cell has a given
decay rate which is not in nitive and strictly depends on temperature. At temperatures
from 50 C down, the contents of RAMs can be \frozen" and kept for one or even more
days. This is what usually happens in a cold-boot attack [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], in which the hacker
uses spray cans or liquid nitrogen on a volatile device just disconnected from the original
system and gains precious time to perform a memory dump, i.e., a copy of the contents on
a non-volatile device for subsequent analysis. Data remanence a ects in a di erent way
non-volatile types of memory such as EEPROM and Flash. Some sensible information
thought to be erased can still be extracted [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ].
      </p>
      <p>
        The attack is instead non-invasive when it can be carried out without any physical contact
with the device under attack. Non-invasive attacks are further split into passive and active.
Passive non-invasive attacks are carried out by analysing and measuring one (or more) physical
dynamic entities of the attacked hardware. All di erent types of side-channel attacks [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] [
        <xref ref-type="bibr" rid="ref54">54</xref>
        ]
belong to this category. Active non-invasive attacks require instead speci c actions on the
device, aimed at forcing the system into abnormal states in which the goal is easier to reach. This
category includes all the di erent types of fault attacks [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and test-infrastructure-based
attacks [
        <xref ref-type="bibr" rid="ref57">57</xref>
        ] [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ].
      </p>
      <p>
        Side-Channel Attacks. Being something with physical consistence, when it is in activity, the
hardware unintentionally releases in the surrounding environment a certain number of \clues",
such as spent time, spent energy, electromagnetic radiation released, noise, etc.. These clues,
along with the knowledge of some details about the device structure or just about the executed
algorithms, may turn out to be critical for information protection. The mostly known classes
of side-channel attacks are:
• Timing Attacks : A timing side-channel attack tries to recover sensible data by measuring
their computation time in a piece of hardware. In most cases, the algorithm
implementation strongly depends on the actual values of its input. If an attacker knows this
correlation, he can extract, for example, the encryption key or the password that is being
processed. Examples of timing attacks against hardware implementations of RSA [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] or
AES [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] have been presented in literature.
• Power Attacks : The actual power consumption of a programmable device depends on
both the executed instructions and the processed data. A power side-channel attack tries
to read in reverse this process and to recover sensible data processed by measuring the
variation of power consumption of the hardware device [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] [
        <xref ref-type="bibr" rid="ref53">53</xref>
        ].
• Electromagnetic Attacks : Whenever a current ows, an electromagnetic eld is created
around it. This radiation unintentionally carries information about the source, and by
resorting to proper capturing devices, such as an induction coil, located in the proximity
of the device, one can reconstruct the digital signal which originated it [
        <xref ref-type="bibr" rid="ref59">59</xref>
        ].
• Acoustic Attacks : Acoustic cryptoanalysis exploits vibration produced by hardware
components of every kind and at any level, from device to circuit level. Covert listening
devices may be placed by attackers to record the sound emitted by keyboards and
keypads, and then a signi cative amount of sensed data can be later processed by signal
analysis and/or Machine Learning algorithms to associate a particular sound-wave with
the pressed key [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ] [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Acoustic emissions in the ultrasonic band occur in circuit
elements as coils and capacitors as a consequence of the current owing through them.
Voltage regulation circuits in PC motherboards are responsible for acoustic emanation
which are directly correlated with CPU activity [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
• Optical Attacks : Besides draining current or emitting radiation, a transistor that switches
also emits some light in the form of a few photons for a very short time. If an attacker
is able to detect such an emission, he can steel sensible information from the circuit [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
Alternatively, information-carrying light emissions can also be exploited when LEDs are
employed as device activity indicators [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ].
      </p>
      <p>
        Fault Attacks. They consist in the injection of deliberate (malicious) faults into the target
device, aimed at bringing it into a set of states from which private internal information items
can be fraudolently extracted. Types of fault attacks are mostly clustered according to the
fault injection techniques. The most relevant are:
• Supply Attacks : If an attacker is able to tap into the power supply line of the target device
and connect his power unit, he can underpower the device itself. If the power is lower, the
delay of logic gates increases and in the case of critical paths it may happen that wrong
values are sampled; this practically implies that one, or more, faulty bits, are injected into
the system [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. On the other hand, if a chip is overpowered, serious damaging actions
can be carried out.
• Clock Attacks: The length of a single cycle can be shortened through forcing a premature
toggling of the clock signal. In this way, registered bytes can be corrupted. To alter the
length of the clock cycle, the attacker needs to get a direct control of the clock line, as it
typically happens when smart cards are targeted. As an unplanned clock edge introduces
a glitch in the internal signals, these attacks are also knowns as Glitch Attacks [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
• Heating Attacks : Rising the temperature in the environment in which the target device
operates may be exployted to attack it. Electrons inside the transistors are excited by
the surrounding heat and random currents are generated, which may lead to bit ipping
(both in SRAM memory cells inside processors and in DRAM memory cells) or even to
accelerated the ageing of the circuit, with the extreme consequence of its destruction when
the overheating reaches a given threshold [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
• Radiation Attacks: A practical way to induce faults without having to tap into the device
is to cause strong electromagnetic disturbances near it. The eddy currents induced in the
circuit by strong EM pulses cause temporary alterations of the level of a signal, which
may be, for example, recorded by a latch or a ip- op. When the disturbance becomes
higher and higher, components of the device may stop working or even be physically
destroyed [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ].
      </p>
      <p>
        Test-Infrastructure-Based Attacks. Hardware designers systematically rely on
Design-forTestability and Built-in Self Test (BIST) methodologies [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] to improve testability of the target
system both at the end-of-production and in- eld. Some of these methodologies are so widely
adopted to become standards, both de-facto and de-iure. Examples include, among the many,
IEEE 1149.1 (aka Boundary Scan) and IEEE 1500. Unfortunately, these test infrastructures,
mandatory for getting the desired levels of testability in terms of cost, in most cases create
severe security hazards. As an example, when the pins of an 1149.1 standard interface are left
outside accessible, a potential attacker can easily exploit the scan chain to get the data stored
into the connected ip- ops. Once the position of the target elements (e.g., registers containing
secret keys) inside the chain are known, the attack is very easily accomplished [
        <xref ref-type="bibr" rid="ref57">57</xref>
        ] [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ].
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>In this paper, we emphasized the importance of information security aspects related to
hardware, and we have tried to characterize the roles that it has in the security domain. In fact, not
everything related to \hardware" and \security" can be collected into the Hardware Security
eld, but should instead be distinguished. First, the hardware can be seen as a component to
be secured, since it may contain vulnerabilities like any other component: this is the actual
domain of Hardware Security. The hardware can also be seen as a mean by which to implement
the system's security (Hardware-Based Security). On the other hand, there are several issues
related to the Hardware Trust, which has to do with the authenticity of hardware components
and the contrast to counterfeiting.</p>
      <p>We have then proposed a de nition of hardware vulnerability and hardware attack,
providing for each of these two concepts a meaningful and comprehensive taxonomy. We classi ed
vulnerabilities depending on their domain (logical, physical) and on their nature (intentional,
unintentional). We then classi ed attacks depending on their target (information, property),
their goal to be reached on the target (steal, corrupt, inhibit), the way they are carried out
(invasively, non-invasively) and the domain in which they are implemented (logical, physical).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Senate</given-names>
            <surname>Armed Services Committee Releases</surname>
          </string-name>
          <article-title>Report on Counterfeit Electronic Parts</article-title>
          . https://www.armed-services.senate.gov/press-releases/
          <article-title>senate-armed-services-committee-releases-report-on-counterfeit-electronic-</article-title>
          <string-name>
            <surname>parts</surname>
          </string-name>
          ,
          <year>2012</year>
          . [Online; accessed 16-January-2020].
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] CVE - Terminology. https://cve.mitre.org/about/terminology.html,
          <year>2019</year>
          . [Online; accessed 26-November-2019].
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Information</given-names>
            <surname>Security - Glossary</surname>
          </string-name>
          | CSRC. https://csrc.nist.gov/glossary/term/ information-security,
          <year>2019</year>
          . [Online; accessed 25-November-2019].
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Al-Ars</surname>
          </string-name>
          and
          <string-name>
            <surname>A. J. van de Goor.</surname>
          </string-name>
          <article-title>Approximating in nite dynamic behavior for dram cell defects</article-title>
          .
          <source>In Proceedings 20th IEEE VLSI Test Symposium (VTS</source>
          <year>2002</year>
          ), pages
          <fpage>401</fpage>
          {
          <fpage>406</fpage>
          ,
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Anderson</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          .
          <article-title>Tamper resistance-a cautionary note</article-title>
          .
          <source>In Proceedings of the second Usenix workshop on electronic commerce</source>
          , volume
          <volume>2</volume>
          , pages
          <fpage>1</fpage>
          {
          <fpage>11</fpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Anderson</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          .
          <article-title>Low cost attacks on tamper resistant devices</article-title>
          . In B.
          <string-name>
            <surname>Christianson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Crispo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lomas</surname>
          </string-name>
          , and M. Roe, editors,
          <source>Security Protocols</source>
          , pages
          <volume>125</volume>
          {
          <fpage>136</fpage>
          , Berlin, Heidelberg,
          <year>1998</year>
          . Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          , R. De Nicola, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Prinetto</surname>
          </string-name>
          .
          <article-title>Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici</article-title>
          .
          <source>Consorzio Interuniversitario Nazionale per l'Informatica - CINI</source>
          ,
          <year>2018</year>
          . ISBN:
          <volume>9788894137330</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Barenghi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Breveglieri</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Koren</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Naccache</surname>
          </string-name>
          .
          <article-title>Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures</article-title>
          .
          <source>Proceedings of the IEEE</source>
          ,
          <volume>100</volume>
          (
          <issue>11</issue>
          ):
          <volume>3056</volume>
          {
          <fpage>3076</fpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          .
          <article-title>Cache-timing attacks on AES</article-title>
          .
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhunia</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Tehranipoor</surname>
          </string-name>
          .
          <article-title>Hardware Security: A Hands-on Learning Approach</article-title>
          . Morgan Kaufmann,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Biham</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          .
          <article-title>Di erential fault analysis of secret key cryptosystems</article-title>
          .
          <source>In Annual international cryptology conference</source>
          , pages
          <volume>513</volume>
          {
          <fpage>525</fpage>
          . Springer,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>J. Van Bulck</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Minkin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Weisse</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Genkin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Kasikci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Piessens</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Silberstein</surname>
            ,
            <given-names>T. F.</given-names>
          </string-name>
          <string-name>
            <surname>Wenisch</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Yarom</surname>
            , and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Strackx</surname>
          </string-name>
          .
          <article-title>Foreshadow: Extracting the keys to the intel sgx kingdom with transient out-of-order execution</article-title>
          .
          <source>In 27th USENIX Security Symposium USENIX Security 18)</source>
          , pages
          <fpage>991</fpage>
          {
          <fpage>1008</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bushnell</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          .
          <article-title>Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits</article-title>
          , volume
          <volume>17</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S. Di</given-names>
            <surname>Carlo</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Prinetto</surname>
          </string-name>
          .
          <article-title>Models in memory testing</article-title>
          .
          <source>In Models in Hardware Testing</source>
          , pages
          <volume>157</volume>
          {
          <fpage>185</fpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Domas</surname>
          </string-name>
          .
          <source>Hardware backdoors in x86 cpus</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dusart</surname>
          </string-name>
          , G. Letourneux, and
          <string-name>
            <given-names>O.</given-names>
            <surname>Vivolo</surname>
          </string-name>
          .
          <article-title>Di erential fault analysis on AES</article-title>
          .
          <source>In International Conference on Applied Cryptography and Network Security</source>
          , pages
          <volume>293</volume>
          {
          <fpage>306</fpage>
          . Springer,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ferrigno</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hlavac</surname>
          </string-name>
          .
          <article-title>When aes blinks: introducing optical side channel</article-title>
          .
          <source>IET Information Security</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          ):
          <volume>94</volume>
          {
          <fpage>98</fpage>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          .
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Fukunaga</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Takahashi</surname>
          </string-name>
          .
          <article-title>Practical fault attack on a cryptographic lsi with iso/iec 18033-3 block ciphers</article-title>
          .
          <source>In 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</source>
          , pages
          <fpage>84</fpage>
          {
          <fpage>92</fpage>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fyrbiak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Strau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wallat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Elson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Rummel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Paar</surname>
          </string-name>
          .
          <article-title>Hardware reverse engineering: Overview and open challenges</article-title>
          .
          <source>In 2017 IEEE 2nd International Veri cation and Security Workshop (IVSW)</source>
          , pages
          <fpage>88</fpage>
          {
          <fpage>94</fpage>
          ,
          <year>July 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yarom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Cock</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Heiser</surname>
          </string-name>
          .
          <article-title>A survey of microarchitectural timing attacks and countermeasures on contemporary hardware</article-title>
          .
          <source>Journal of Cryptographic Engineering</source>
          ,
          <volume>8</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>27</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Genkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Tromer.</surname>
          </string-name>
          <article-title>RSA key extraction via low-bandwidth acoustic cryptanalysis</article-title>
          .
          <source>In International cryptology conference</source>
          , pages
          <volume>444</volume>
          {
          <fpage>461</fpage>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gruhn</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Mu</surname>
          </string-name>
          <article-title>ller. On the Practicability of Cold Boot Attacks</article-title>
          . In 2013 International Conference on Availability,
          <source>Reliability and Security</source>
          , pages
          <volume>390</volume>
          {
          <fpage>397</fpage>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Halderman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Schoen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Heninger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Clarkson</surname>
          </string-name>
          , W. Paul,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Calandrino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Feldman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Appelbaum</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. W.</given-names>
            <surname>Felten</surname>
          </string-name>
          .
          <source>Lest We Remember: Cold Boot Attacks on Encryption Keys</source>
          . pages
          <fpage>45</fpage>
          {
          <fpage>60</fpage>
          , 01
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>T.</given-names>
            <surname>Halevi</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Saxena</surname>
          </string-name>
          .
          <article-title>Keyboard acoustic side channel attacks: exploring realistic and securitysensitive scenarios</article-title>
          .
          <source>International Journal of Information Security</source>
          ,
          <volume>14</volume>
          (
          <issue>5</issue>
          ):
          <volume>443</volume>
          {
          <fpage>456</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hamdioui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Danger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Di</given-names>
            <surname>Natale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Smailbegovic</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. van Battum</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Tehranipoor</surname>
          </string-name>
          .
          <article-title>Hacking and protecting ic hardware</article-title>
          .
          <source>In 2014 Design, Automation Test in Europe Conference Exhibition (DATE)</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          7,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>N .</given-names>
            <surname>Hatami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Baranowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Prinetto</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Wunderlich</surname>
          </string-name>
          .
          <article-title>Multilevel simulation of nonfunctional properties by piecewise evaluation</article-title>
          .
          <source>ACM Trans. Des</source>
          . Autom. Electron. Syst.,
          <volume>19</volume>
          (
          <issue>4</issue>
          ):
          <volume>37</volume>
          :1{
          <fpage>37</fpage>
          :
          <fpage>21</fpage>
          ,
          <year>August 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hutter</surname>
          </string-name>
          and
          <string-name>
            <surname>J. Schmidt.</surname>
          </string-name>
          <article-title>The temperature side channel and heating fault attacks</article-title>
          .
          <source>In International Conference on Smart Card Research and Advanced Applications</source>
          , pages
          <volume>219</volume>
          {
          <fpage>235</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moghimi</surname>
          </string-name>
          , I. Bruhns,
          <string-name>
            <given-names>M.</given-names>
            <surname>Krebbel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gulmezoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Eisenbarth</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Sunar</surname>
          </string-name>
          . Spoiler:
          <article-title>Speculative load hazards boost rowhammer and cache attacks</article-title>
          .
          <source>arXiv preprint arXiv:1903.00446</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kaushik</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Majumdar</surname>
          </string-name>
          .
          <article-title>Timing attack analysis on aes on modern processors</article-title>
          .
          <source>In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)</source>
          , pages
          <fpage>462</fpage>
          {
          <fpage>465</fpage>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          .
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Daly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fallin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wilkerson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lai</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Mutlu</surname>
          </string-name>
          .
          <article-title>Flipping bits in memory without accessing them: An experimental study of dram disturbance errors</article-title>
          .
          <source>In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)</source>
          , pages
          <fpage>361</fpage>
          {
          <fpage>372</fpage>
          ,
          <year>June 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Genkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gruss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Haas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hamburg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lipp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Prescher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwarz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yarom</surname>
          </string-name>
          .
          <article-title>Spectre attacks: Exploiting speculative execution</article-title>
          .
          <source>In 40th IEEE Symposium on Security and Privacy (S&amp;P'19)</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kocher</surname>
          </string-name>
          , J. Ja e, and
          <string-name>
            <given-names>B.</given-names>
            <surname>Jun</surname>
          </string-name>
          .
          <article-title>Di erential power analysis</article-title>
          .
          <source>In Annual International Cryptology Conference</source>
          , pages
          <volume>388</volume>
          {
          <fpage>397</fpage>
          . Springer,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Kocher</surname>
          </string-name>
          .
          <article-title>Timing attacks on implementations of Di e-Hellman, RSA, DSS, and other systems</article-title>
          .
          <source>In Annual International Cryptology Conference</source>
          , pages
          <volume>104</volume>
          {
          <fpage>113</fpage>
          . Springer,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          .
          <article-title>Hardware metering: A survey</article-title>
          .
          <source>In Introduction to Hardware Security and Trust</source>
          , pages
          <volume>103</volume>
          {
          <fpage>122</fpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Qu</surname>
          </string-name>
          .
          <article-title>Hardware metering</article-title>
          .
          <source>In Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232)</source>
          , pages
          <fpage>490</fpage>
          {
          <fpage>493</fpage>
          ,
          <year>June 2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Introduction to side-channel attacks and fault attacks</article-title>
          .
          <source>In 2016 Asia-Paci c International Symposium on Electromagnetic Compatibility (APEMC)</source>
          , volume
          <volume>01</volume>
          , pages
          <fpage>573</fpage>
          {
          <fpage>575</fpage>
          , May
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lipp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwarz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gruss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Prescher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Haas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Genkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yarom</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hamburg</surname>
          </string-name>
          . Meltdown:
          <article-title>Reading kernel memory from user space</article-title>
          .
          <source>In 27th USENIX Security Symposium (USENIX Security 18)</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>J.</given-names>
            <surname>Loughry</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Umphress</surname>
          </string-name>
          .
          <article-title>Information leakage from optical emanations</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC)</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ):
          <volume>262</volume>
          {
          <fpage>289</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangard</surname>
          </string-name>
          , E. Oswald, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Popp</surname>
          </string-name>
          .
          <article-title>Power analysis attacks: Revealing the secrets of smart cards</article-title>
          , volume
          <volume>31</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>R.</given-names>
            <surname>Pappu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Recht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Gershenfeld</surname>
          </string-name>
          .
          <article-title>Physical one-way functions</article-title>
          .
          <source>Science</source>
          ,
          <volume>297</volume>
          (
          <issue>5589</issue>
          ):
          <year>2026</year>
          {
          <year>2030</year>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>J.</given-names>
            <surname>Quisquater</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Samyde</surname>
          </string-name>
          .
          <article-title>Electromagnetic analysis (ema): Measures and counter-measures for smart cards</article-title>
          .
          <source>In International Conference on Research in Smart Cards</source>
          , pages
          <volume>200</volume>
          {
          <fpage>210</fpage>
          . Springer,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>S. Subhra R.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhunia</surname>
          </string-name>
          .
          <article-title>Hardware protection and authentication through netlist level obfuscation</article-title>
          .
          <source>In Proceedings of the 2008 IEEE/ACM International Conference on ComputerAided Design</source>
          , pages
          <volume>674</volume>
          {
          <fpage>677</fpage>
          . IEEE Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>V .</given-names>
            <surname>Ranade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Smith</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Switala</surname>
          </string-name>
          .
          <article-title>Acoustic side channel attack on atm keypads</article-title>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>J. Da</given-names>
            <surname>Rolt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Di</given-names>
            <surname>Natale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Flottes</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Rouzeyre</surname>
          </string-name>
          .
          <article-title>A novel di erential scan attack on advanced dft structures</article-title>
          .
          <source>ACM Trans. Des</source>
          . Autom. Electron. Syst.,
          <volume>18</volume>
          (
          <issue>4</issue>
          ):
          <volume>58</volume>
          :1{
          <fpage>58</fpage>
          :
          <fpage>22</fpage>
          ,
          <year>October 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rostami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Karri</surname>
          </string-name>
          .
          <article-title>A primer on hardware security: Models, methods, and metrics</article-title>
          .
          <source>Proceedings of the IEEE</source>
          ,
          <volume>102</volume>
          (
          <issue>8</issue>
          ):
          <volume>1283</volume>
          {
          <fpage>1295</fpage>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hutter</surname>
          </string-name>
          .
          <article-title>Optical and EM fault-attacks on CRT-based RSA: Concrete results</article-title>
          . na,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwarz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lipp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Moghimi</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Van Bulck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stecklina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Prescher</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gruss</surname>
          </string-name>
          . Zombieload:
          <article-title>Cross-privilege-boundary data sampling</article-title>
          .
          <source>arXiv preprint arXiv:1905.05726</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwarz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Weiser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gruss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Maurice</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangard</surname>
          </string-name>
          .
          <article-title>Malware guard extension: Using sgx to conceal cache attacks</article-title>
          .
          <source>In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment</source>
          , pages
          <fpage>3</fpage>
          <lpage>{</lpage>
          24. Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>M.</given-names>
            <surname>Seaborn</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Dullien</surname>
          </string-name>
          .
          <article-title>Exploiting the dram rowhammer bug to gain kernel privileges</article-title>
          .
          <source>Black Hat</source>
          ,
          <volume>15</volume>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Asadizanjani</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Tehranipoor</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Forte</surname>
          </string-name>
          .
          <article-title>A comprehensive analysis on vulnerability of active shields to tilted microprobing attacks</article-title>
          .
          <source>In 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)</source>
          , pages
          <fpage>98</fpage>
          {
          <fpage>103</fpage>
          ,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>S.</given-names>
            <surname>Skorobogatov</surname>
          </string-name>
          .
          <article-title>Data remanence in ash memory devices</article-title>
          .
          <source>In International Workshop on Cryptographic Hardware and Embedded Systems</source>
          , pages
          <fpage>339</fpage>
          {
          <fpage>353</fpage>
          . Springer,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>S.</given-names>
            <surname>Skorobogatov</surname>
          </string-name>
          .
          <article-title>How microprobing can attack encrypted memory</article-title>
          .
          <source>In 2017 Euromicro Conference on Digital System Design (DSD)</source>
          , pages
          <fpage>244</fpage>
          {
          <fpage>251</fpage>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>P.</given-names>
            <surname>Socha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brejnk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Bartik</surname>
          </string-name>
          .
          <article-title>Attacking aes implementations using correlation power analysis on zybo zynq-7000 soc board</article-title>
          .
          <source>In 2018 7th Mediterranean Conference on Embedded Computing (MECO)</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          4,
          <string-name>
            <surname>June</surname>
          </string-name>
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>R.</given-names>
            <surname>Spreitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Moonsamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Korak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangard</surname>
          </string-name>
          .
          <article-title>Systematic classi cation of side-channel attacks: a case study for mobile devices</article-title>
          .
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>K.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Forte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Karri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhunia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Tehranipoor</surname>
          </string-name>
          .
          <article-title>Hardware trojans: Lessons learned after one decade of research</article-title>
          .
          <source>ACM Transactions on Design Automation of Electronic Systems (TODAES)</source>
          ,
          <volume>22</volume>
          (
          <issue>1</issue>
          ):
          <fpage>6</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Teodorescu</surname>
          </string-name>
          .
          <article-title>One bit ips, one cloud ops: Cross-vm row hammer attacks and privilege escalation</article-title>
          .
          <source>In 25th USENIX Security Symposium USENIX Security 16)</source>
          , pages
          <fpage>19</fpage>
          {
          <fpage>35</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Karri</surname>
          </string-name>
          .
          <article-title>Scan based side channel attack on dedicated hardware implementations of data encryption standard</article-title>
          .
          <source>In 2004 International Conferce on Test</source>
          , pages
          <volume>339</volume>
          {
          <fpage>344</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yarom</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Falkner</surname>
          </string-name>
          .
          <article-title>Flush+ reload: a high resolution, low noise, l3 cache side-channel attack</article-title>
          .
          <source>In 23rd USENIX Security Symposium USENIX Security 14)</source>
          , pages
          <fpage>719</fpage>
          {
          <fpage>732</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>B. B.</given-names>
            <surname>Yilmaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Prvulovic</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaji</surname>
          </string-name>
          .
          <article-title>Electromagnetic side channel information leakage created by execution of series of instructions in a computer processor</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          ,
          <volume>15</volume>
          :
          <fpage>776</fpage>
          {
          <fpage>789</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>