{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:38:07Z","timestamp":1725568687747},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642144516"},{"type":"electronic","value":"9783642144523"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14452-3_14","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T16:30:15Z","timestamp":1288715415000},"page":"309-329","source":"Crossref","is-referenced-by-count":1,"title":["Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations"],"prefix":"10.1007","author":[{"given":"Daniel Y.","family":"Deng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew H.","family":"Chan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2010,10,12]]},"reference":[{"key":"14_CR1","first-page":"296","volume-title":"Trojan Detection Using IC Fingerprinting","author":"D. Agrawal","year":"2007","unstructured":"D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of IEEE 2007 Symposium on Security and Privacy, Oakland, CA, USA, 20\u201323 May 2007, pp. 296\u2013310"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"A. Aharon, D. Goodman, M. Levinger, Y. Lichtenstein, Y. Malka, C. Metzger, M. Molcho, G. Shurek, in Test Program Generation for Functional Verification of Powerpc Processors in IBM. Design Automation Conference,1995, pp. 279\u2013285","DOI":"10.1145\/217474.217542"},{"key":"14_CR3","volume-title":"FPGA-Based Fast, Cycle-Accurate, Full-System Simulators","author":"D. Chiou","year":"2006","unstructured":"D. Chiou, H. Sunjeliwala, D. Sunwoo, J. Xu, N. Patil, in FPGA-Based Fast, Cycle-Accurate, Full-System Simulators. Proceedings of the 2nd Annual Workshop on Architecture Research using FPGA Platforms, Austin, TX, USA, 12 February 2006"},{"key":"14_CR4","unstructured":"H. de Vries, \n                    http:\/\/www.chip-architect.com\/"},{"key":"14_CR5","first-page":"22","volume-title":"Designing Hardware that Supports Cycle-Accurate Deterministic Replay","author":"B. Greskamp","year":"2006","unstructured":"B. Greskamp, S.R. Sarangi, J. Torrelas, in Designing Hardware that Supports Cycle-Accurate Deterministic Replay. Proceedings of 2006 Workshop on Complexity-Effective Design, Boston, MA, USA, 18 June 2006, 22\u201325"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MC.2002.1023787","volume":"35","author":"P. Gutmann","year":"2002","unstructured":"P. Gutmann, PKI: It\u2019s not dead, just resting. Computer 35, 41\u201340 (Aug 2002)","journal-title":"Computer"},{"key":"14_CR7","volume-title":"Keeping Secrets in Hardware: The Microsoft Xbox Case Study","author":"A. Huang","year":"2002","unstructured":"A. Huang, in Keeping Secrets in Hardware: The Microsoft Xbox Case Study. Cryptographic Hardware and Embedded Systems - CHES Redwood City, CA, USA, 13\u201315 Aug 2002. Lecture Notes in Computer Science, vol. 2523 (Springer, Heidelberg, 2002)"},{"key":"14_CR8","unstructured":"Intel. Intel Trusted Execution Technology. \n                    http:\/\/www.intel.com\/technology\/security\/\n                    \n                  , 2007"},{"key":"14_CR9","first-page":"295","volume-title":"Establishing the Genuinity of Remote Computer Systems","author":"R. Kennel","year":"2003","unstructured":"R. Kennel, L.H. Jamieson, in Establishing the Genuinity of Remote Computer Systems. Proceedings of the 12th Annual USENIX Security Symposium, Washington, DC, USA, 4\u20138 Aug 2003, pp. 295\u2013308"},{"key":"14_CR10","first-page":"471","volume-title":"A New Class of Invertible Mappings","author":"A. Klimov","year":"2002","unstructured":"A. Klimov, A. Shamir, in A New Class of Invertible Mappings. 4th International Workshop on Cryptographic Hardware and Embedded Systems - Revised Papers, Redwood City, CA, USA, 13\u201315 Aug 2002, pp. 471\u2013484"},{"key":"14_CR11","first-page":"303","volume-title":"Just How Accurate Are Performance Counters?","author":"W. Korn","year":"2001","unstructured":"W. Korn, P.J. Teller, G. Castillo, in Just How Accurate Are Performance Counters? Proceedings of the 2001 IEEE International Conference on Performance, Computing, and Communications, Phoenix, AZ, USA, 4\u20136 Apr 2001, pp. 303\u2013310"},{"key":"14_CR12","doi-asserted-by":"crossref","first-page":"168","DOI":"10.21236\/ADA419599","volume-title":"Architectural Support for Copy and Tamper Resistant Software","author":"D. Lie","year":"2000","unstructured":"D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, in Architectural Support for Copy and Tamper Resistant Software. Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, USA, 12\u201315 Nov 2000, pp. 168\u2013177"},{"key":"14_CR13","unstructured":"M. Pellauer, J. Emer, A. Thiagarajan: Implementing a Partitioned Performance Model on an FPGA. \n                    http:\/\/publications.csail.mit.edu\/abstracts\/abstracts07\/\n                    \n                   pellauer-abstract\/hasim.html"},{"key":"14_CR14","unstructured":"J. Renau, B. Fraguela, J. Tuck, W. Liu, M. Prvulovic, L. Ceze, S. Sarangi, P. Sack, K. Strauss, P. Montesinos, SESC simulator, Jan 2005. \n                    http:\/\/sesc.sourceforge.net"},{"key":"14_CR15","volume-title":"ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS","author":"A. Satoh","year":"2005","unstructured":"A. Satoh, T. Inoue, in ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201905), Las Vegas, NV, USA, 4\u20136 Apr 2005"},{"key":"14_CR16","first-page":"148","volume-title":"Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems","author":"A. Seshadri","year":"2005","unstructured":"A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, P. Khosla, in Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. Proceedings of the 20th Annual Symposium on Operating Systems Principles, Brighton, UK, 23\u201326 Oct 2005, pp. 148\u2013162"},{"key":"14_CR17","volume-title":"SWATT: SoftWare-Based ATTestation for Embedded Devices","author":"A. Seshadri","year":"2004","unstructured":"A. Seshadri, A. Perrig, L. van Doorn, P. Khosla, in SWATT: SoftWare-Based ATTestation for Embedded Devices. 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 9\u201312 May 2004"},{"key":"14_CR18","first-page":"89","volume-title":"Side Effects Are not Sufficient to Authenticate Software","author":"U. Shankar","year":"2004","unstructured":"U. Shankar, M. Chew, J.D. Tygar, in Side Effects Are not Sufficient to Authenticate Software. Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, 9\u201313 Aug 2004, pp. 89\u2013101"},{"key":"14_CR19","volume-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"G.E. Suh","year":"2007","unstructured":"G.E. Suh, S. Devadas, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 44th Design Automation Conference, San Diego, CA, USA, 4\u20138 June 2007"},{"key":"14_CR20","volume-title":"Design and Implementation of the aegis Single-Chip Secure Processor Using Physical Random Functions","author":"G.E. Suh","year":"2005","unstructured":"G.E. Suh, C.W. O\u2019Donnell, I. Sachdev, S. Devadas, in Design and Implementation of the\n                  aegis\n                  Single-Chip Secure Processor Using Physical Random Functions. Proceedings of the 32nd Annual International Symposium on Computer Architecture, Madison, WI, USA, 4\u20138 June 2005"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"H. Tago, K. Hashimotof, N. Ikumi, M. Nagamatsu, M. Suzuoki, Y. Yamamoto, in Importance of CAD Tools and Methodologies in High Speed CPU Design. Proceedings of the Asia and South Pacific Design Automation Conferences (ASP-DAC 2000), Yokohama, Japan, 25\u201328 Jan 2000, pp. 631\u2013633","DOI":"10.1145\/368434.368842"},{"key":"14_CR22","unstructured":"Trusted Computing Group. TCG Specification Architecture Overview. \n                    http:\/\/www.trustedcomputinggroup.com\/"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/JSSC.2002.803944","volume":"37","author":"S. Vangal","year":"2002","unstructured":"S. Vangal, M.A. Anders, N. Borkar, E. Seligman, V. Govindarajulu, V. Erraguntla, H. Wilson, A. Pangal, V. Veeramachaneni, J.W. Tschanz, Y. Ye, D. Somasekhar, B.A. Bloechel, G.E. Dermer, R.K. Krishnamurthy, K. Soumyanath, S. Mathew, S.G. Narendra, M.R. Stan, S. Thompson, V. De, S. Borkar, 5-GHz 32-bit integer execution core in 130-nm dual-V\/sub T\/CMOS. IEEE J. Solid-State Circuits 37, 1421\u20131432 (Nov 2002)","journal-title":"IEEE J. Solid-State Circuits"},{"key":"14_CR24","volume-title":"Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline","author":"N.J. Wang","year":"2004","unstructured":"N.J. Wang, J. Quek, T.M. Rafacz, S.J. Patel, in Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline. Proceedings of the 2004 International Conference on Dependable Systems and Networks, Florence, Italy, 28 June\u20131 July 2004"}],"container-title":["Information Security and Cryptography","Towards Hardware-Intrinsic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14452-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T01:30:24Z","timestamp":1553218224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14452-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144516","9783642144523"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14452-3_14","relation":{},"ISSN":["1619-7100"],"issn-type":[{"type":"print","value":"1619-7100"}],"subject":[],"published":{"date-parts":[[2010]]}}}