{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:17:55Z","timestamp":1774945075882,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030797270","type":"print"},{"value":"9783030797287","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_29","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"295-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification"],"prefix":"10.1007","author":[{"given":"Jiatong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Long","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Duflot, L.: CPU bugs, CPU backdoors and consequences on security. J. Comput. Virol. 5(2), 91\u2013104 (2009)","DOI":"10.1007\/s11416-008-0109-x"},{"key":"29_CR2","unstructured":"Domas, C.: Hardware backdoors in x86 CPUs. Black Hat, 1\u201314 (2018)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: HIT: a hidden instruction trojan model for processors. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1271\u20131274. IEEE (2020)","DOI":"10.23919\/DATE48585.2020.9116228"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: UISFuzz: an efficient fuzzing method for cpu undocumented instruction searching. IEEE Access 7, 149224\u2013149236 (2019)","DOI":"10.1109\/ACCESS.2019.2946444"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Wu, H., Wei, Q., Wu, Z.: Research on CPU instruction security. In: 2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC), pp. 233\u2013239. IEEE (2020)","DOI":"10.1109\/ICCEIC51584.2020.00052"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Dofferhoff, R., et al.: iScanU: a portable scanner for undocumented instructions on RISC processors. In: 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 306\u2013317. IEEE (2020)","DOI":"10.1109\/DSN48063.2020.00047"},{"key":"29_CR7","unstructured":"Dofferhoff, R.: A performance evaluation of platform-independent methods to search for hidden instructions on RISC processors"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Strupe, F., Kumar, R.: Uncovering hidden instructions in Armv8-A implementations. In: Workshop on Hardware and Architectural Support for Security and Privacy (2020)","DOI":"10.1145\/3458903.3458906"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1\u201319. IEEE (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, J., et al.: CPU security benchmark. In: Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors, pp. 8\u201314 (2018)","DOI":"10.1145\/3267494.3267499"},{"key":"29_CR11","unstructured":"Canella, C., et al.: A systematic evaluation of transient execution attacks and defenses. In: 28th {USENIX} Security Symposium ({USENIX} Security 19), pp. 249\u2013266 (2019)"},{"key":"29_CR12","unstructured":"Shamshiri, S., Esmaeilzadeh, H., Navabi, Z.: Test instruction set (TIS) for high level self-testing of CPU cores. In: Proceedings of the 13th Asian Test Symposium, November, pp. 158\u2013163 (2004)"},{"key":"29_CR13","unstructured":"Ahmad, B.A.: Real time detection of spectre and meltdown attacks using machine learning. arXiv preprint arXiv:2006.01442 (2020)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International High Level Design Validation and Test Workshop, pp. 166\u2013171. IEEE (2009)","DOI":"10.1109\/HLDVT.2009.5340158"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T08:59:17Z","timestamp":1672563557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}