{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:11:15Z","timestamp":1748751075763,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_31","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T12:24:45Z","timestamp":1448281485000},"page":"428-438","source":"Crossref","is-referenced-by-count":1,"title":["Cryptographically Secure On-Chip Firewalling"],"prefix":"10.1007","author":[{"given":"Jean-Michel","family":"Cioranesco","sequence":"first","affiliation":[]},{"given":"Craig","family":"Hampel","sequence":"additional","affiliation":[]},{"given":"Guilherme Ozari","family":"de Almeida","sequence":"additional","affiliation":[]},{"given":"Rodrigo Portella","family":"do Canto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"31_CR1","unstructured":"ARM. TZC-400 trustzone address space controller technical reference manual"},{"key":"31_CR2","unstructured":"Arteris. Flex NoC interconnect IP"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Cotret, P., Crenne, J., Gogniat, G., Diguet, J.-P.: Bus-based mpsoc security through communication protection: A latency-efficient alternative. In: 2012 IEEE 20th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 200\u2013207, April 2012","DOI":"10.1109\/FCCM.2012.42"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Diguet, J.-P., Evain, S., Vaslin, R., Gogniat, G., Juin, E.: NOC-centric security of reconfigurable SoC. In: First International Symposium on Networks-on-Chip (NOCS 2007), pp. 223\u2013232, France, May 2007","DOI":"10.1109\/NOCS.2007.32"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: Sp 800\u201338c. recommendation for block cipher modes of operation: The ccm mode for authentication and confidentiality. Technical report, Gaithersburg, MD, United States (2004)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-27257-8_13","volume-title":"Smart Card Research and Advanced Applications","author":"B Ege","year":"2011","unstructured":"Ege, B., Kavun, E.B., Yal\u00e7\u0131n, T.: Memory encryption for smart cards. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 199\u2013216. Springer, Heidelberg (2011)"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R., McGraw, G., Raghunathan, A., Ravi, S.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Design Automation Conference 2004, pp. 753\u2013760, July 2004","DOI":"10.1145\/996566.996771"},{"key":"31_CR8","unstructured":"National Institute of Standards and Technology. FIPS 198\u20131, The Keyed-Hash Message Authentication Code, Federal Information Processing Standard (FIPS). Technical report (2008)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Sepulveda, J., Gogniat, G., Pedraza, C., Pires, R., Chau, W.J., Strum, M.: Hierarchical noc-based security for MP-SoC dynamic protection. In: 2012 IEEE Third Latin American Symposium on Circuits and Systems (LASCAS), pp. 1\u20134, February 2012","DOI":"10.1109\/LASCAS.2012.6180312"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, pp. 339\u2013350. IEEE Computer Society, Washington, DC (2003)","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"31_CR11","unstructured":"TI. OMAP543x Technical Reference Manual"},{"key":"31_CR12","unstructured":"Xilinx. Zynq-7000 All Programmable SoC"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T13:42:23Z","timestamp":1748698943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}