{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:28:56Z","timestamp":1762000136577,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/asap.2017.7995256","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:38:16Z","timestamp":1501533496000},"page":"29-36","source":"Crossref","is-referenced-by-count":18,"title":["Design and comparative evaluation of GPGPU- and FPGA-based MPSoC ECU architectures for secure, dependable, and real-time automotive CPS"],"prefix":"10.1109","author":[{"given":"Bikash","family":"Poudel","sequence":"first","affiliation":[]},{"given":"Naresh","family":"Kumar Giri","sequence":"additional","affiliation":[]},{"given":"Arslan","family":"Munir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/54.57909"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444938"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"ref15","article-title":"Automotive security: From standards to implementation","author":"soja","year":"2014","journal-title":"Technical Report Freescale"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2003.1247706"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88479-8_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/951710.951734"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378190"},{"key":"ref5","first-page":"513","author":"biham","year":"1997","journal-title":"Differential fault analysis of secret key cryptosystems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457125"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2000.903403"},{"journal-title":"ARM Advanced Micro Bus Architecture (AMBA)","year":"2016","key":"ref2"},{"journal-title":"Programming with CAPL","year":"2004","key":"ref1"},{"key":"ref9","first-page":"2","article-title":"Design principles for tamper-resistant smartcard processors","author":"k\u00f6mmerling","year":"1999","journal-title":"Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology"}],"event":{"name":"2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2017,7,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2017,7,12]]}},"container-title":["2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7990450\/7995241\/07995256.pdf?arnumber=7995256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:37:58Z","timestamp":1502897878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7995256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/asap.2017.7995256","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}