{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:42:34Z","timestamp":1740102154170,"version":"3.37.3"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100013549","name":"German Federal Ministry of Education and Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013549","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,31]]},"DOI":"10.1109\/csr57506.2023.10224911","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:50:16Z","timestamp":1693245016000},"page":"470-476","source":"Crossref","is-referenced-by-count":1,"title":["Verified Value Chains, Innovation and Competition"],"prefix":"10.1109","author":[{"given":"Arnd","family":"Weber","sequence":"first","affiliation":[{"name":"Bollschweil,Germany"}]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris and Secure-IC S.A.S.,T&#x00E9;l&#x00E9;com Paris,Paris,France"}]},{"given":"Ren\u00e9","family":"Rathfelder","sequence":"additional","affiliation":[{"name":"IAV,Berlin,Germany"}]},{"given":"Marc","family":"St\u00f6ttinger","sequence":"additional","affiliation":[{"name":"RheinMain University of Applied Sciences,Wiesbaden,Germany"}]},{"given":"Christoph","family":"L\u00fcth","sequence":"additional","affiliation":[{"name":"DFKI,Bremen,Germany"}]},{"given":"Maja","family":"Malenko","sequence":"additional","affiliation":[{"name":"Hensoldt Cyber,Taufkirchen,Germany"}]},{"given":"Torsten","family":"Grawunder","sequence":"additional","affiliation":[{"name":"Swissbit Germany,Berlin,Germany"}]},{"given":"Steffen","family":"Reith","sequence":"additional","affiliation":[{"name":"RheinMain University of Applied Sciences,Wiesbaden,Germany"}]},{"given":"Armand","family":"Puccetti","sequence":"additional","affiliation":[{"name":"CEA-List,Gif sur Yvette,France"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"TU Berlin,Berlin,Germany"}]},{"given":"Norbert","family":"Herfurth","sequence":"additional","affiliation":[{"name":"IHP - Leibniz-Institut f&#x00FC;r innovative Mikroelekironik,Frankfurt\/Oder,Germany"}]},{"given":"Hagen","family":"Sankowski","sequence":"additional","affiliation":[{"name":"LibreSilicon,Berlin,Germany"}]},{"given":"Gernot","family":"Heiser","sequence":"additional","affiliation":[{"name":"UNSW,Sydney,Australia"}]}],"member":"263","reference":[{"journal-title":"Worldwide SIGINT","year":"2013","author":"snowden","key":"ref13"},{"journal-title":"EU muss Chip-Produktion jenseits von Prestigeprojekten ankurbeln","year":"2021","key":"ref57"},{"journal-title":"NSA TAO Supply Chain Interdiction","year":"2013","key":"ref12"},{"journal-title":"Technology Strategy to Drive Moore's Law into Next Decade","year":"0","author":"van den brink","key":"ref56"},{"journal-title":"Unrestricted Warfare","year":"1999","author":"liang","key":"ref15"},{"key":"ref59","article-title":"Control-Lock: Securing Processor Cores Against Software-Controlled Hardware Trojans","author":"\u0161i\u0161ejkovi?","year":"0","journal-title":"ACM Great Lakes Symposium on VLSI"},{"journal-title":"On the Possibility of A Back Door in the NIST SP800-90 Dual EC PRNG","year":"0","author":"shumow","key":"ref14"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0068-0"},{"journal-title":"Spectre Attacks Exploiting Speculative Execution","year":"2018","author":"kocher","key":"ref53"},{"key":"ref52","article-title":"New Directions of Hardware Based Cryptographic Modules for Modern Cars","author":"reith","year":"2016","journal-title":"Presentation given at IT Security for Vehicles D&#x00FC;sseldorf"},{"journal-title":"NSA ANT Catalog","year":"2013","author":"appelbaum","key":"ref11"},{"journal-title":"Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86","year":"2022","author":"wang","key":"ref55"},{"journal-title":"The Long Hack How China Exploited a U S Tech Supplier","year":"2021","key":"ref10"},{"journal-title":"Meltdown","year":"2018","author":"lipp","key":"ref54"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"journal-title":"Google New approach to china","year":"2010","key":"ref16"},{"journal-title":"Presentation at Munich Cyber Security Conference","year":"0","author":"venables","key":"ref19"},{"journal-title":"CVE Details","year":"0","key":"ref18"},{"key":"ref51","article-title":"RISC-V at NVIDIA","author":"sijstermans","year":"2017","journal-title":"6th RISC-V Workshop"},{"journal-title":"The Consequences of Success","year":"2022","author":"brewer","key":"ref50"},{"journal-title":"Progen","year":"2023","key":"ref46"},{"journal-title":"Easimask - Towards Efficient Automated and Secure Implementation of Masking in Hardware","year":"2023","author":"buschkowski","key":"ref45"},{"key":"ref48","first-page":"24","author":"gao","year":"2021","journal-title":"End-to-End Formal Verification of a RISC-V Processor Extended with Capability Pointers"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3110268"},{"journal-title":"The VexRiscV CPU - A New Way to Design","year":"2018","author":"verbeure","key":"ref42"},{"journal-title":"RISC-V SoftCPU contest winners announced","year":"2018","author":"kalnoskas","key":"ref41"},{"journal-title":"Requirements Analysis for an HSM EDA Tools and a Demonstrator Setup","year":"2021","author":"b\u00f6hner","key":"ref44"},{"key":"ref43","article-title":"VE-HEP. Trustworthy Open-Source Hardware","author":"henkes","year":"2022","journal-title":"Presentation at RISC-V Workshop Berlin"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"journal-title":"Breakthrough Silicon Scanning Discovers Back-door in Military Chip","year":"2012","author":"skorobogatov","key":"ref8"},{"journal-title":"No longer a secret How Israel destroyed Syria's Nuclear Reactor","year":"2018","key":"ref7"},{"key":"ref9","article-title":"Supply Chain Security - If I were a Nation State BlueHatIL","author":"huang","year":"2019","journal-title":"Tel Aviv Israel"},{"journal-title":"Continental","year":"2022","key":"ref4"},{"journal-title":"Wired","year":"2021","key":"ref3"},{"journal-title":"The Hunt for the Kill Switch","year":"2008","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0068-0"},{"journal-title":"OpenSource PDK - A key enabler to unlock the potential of an open source design flow","year":"2022","author":"vater","key":"ref40"},{"journal-title":"Caliptra A Datacenter System on a Chip (SOC) Root of Trust (RoT)","year":"0","author":"kelly","key":"ref35"},{"journal-title":"Google KataOS","year":"0","key":"ref34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3151733"},{"journal-title":"Libres","year":"2022","author":"sankowski","key":"ref36"},{"journal-title":"OSS Mobilization Plank","year":"2022","key":"ref31"},{"journal-title":"Unsafe at Any Clock Speed The Insecurity of Computer System Design Implementation and Operation","year":"2022","author":"peisert","key":"ref30"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"ref32","article-title":"Combining Static and Dynamic Analyses for Vulnerability Detection","author":"kiss","year":"0","journal-title":"Illustration on Heartbleed Haifa Verification Conference"},{"journal-title":"Mirai IoT Botnet Description and DDoS Attack Mitigation","year":"2016","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5445\/IR\/1000153445"},{"journal-title":"Horizon Robotics launches Journey 5 chip with 128 TOPS of AI computing power","year":"2021","key":"ref39"},{"journal-title":"seL4 Summit","year":"2022","key":"ref38"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-012-0010-0"},{"key":"ref70","article-title":"OpenTC Final Report","author":"kuhlmann","year":"2009","journal-title":"The Evolution of the OpenTC Architecture illustrated via its Proof-of-Concept-Prototypes"},{"journal-title":"Cybersecurity Certification Guide","year":"2021","key":"ref24"},{"journal-title":"common Criteria Protection Profile","year":"2023","key":"ref68"},{"journal-title":"Commission Staff Working Document","year":"2022","key":"ref23"},{"journal-title":"DIN Spec 3105","year":"0","author":"h\u00e4uer","key":"ref67"},{"journal-title":"COM(2022) 495 - Proposal for a directive of the European Parliament and of the Council on liability for defective products","year":"2022","key":"ref26"},{"journal-title":"Draft Cyber Resilience Act COM(2022) 454 final","year":"2022","key":"ref25"},{"journal-title":"New EN 17640 'Fixed-time cybersecurity evaluation methodology for ICT products' helps evaluate the cybersecurity of ICT products","year":"2022","key":"ref69"},{"journal-title":"Security processors","year":"2000","author":"schneier","key":"ref20"},{"journal-title":"Open-source software vs the proposed Cyber Resilience Act","year":"0","author":"aertsen","key":"ref64"},{"key":"ref63","article-title":"Cyber Resilience Act","author":"b\u00f6gel","year":"2023","journal-title":"Presentation at FOSDEM"},{"journal-title":"Bitcom Wirtschaftsschutz","year":"2021","key":"ref22"},{"journal-title":"EU Open Source Policy Summit","year":"2023","key":"ref66"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2015.11.009"},{"journal-title":"The ultimate list of reactions to the CRA","year":"2023","author":"phipps","key":"ref65"},{"journal-title":"Open Technology Fund","year":"2023","key":"ref28"},{"journal-title":"Biden-Harris Administration Announces National Cybersecurity Strategy","year":"2023","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00105"},{"journal-title":"Trojan-Resilient Circuits","year":"2015","author":"seifert","key":"ref60"},{"journal-title":"Comments at MCSC","year":"2023","author":"kallas","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_24"}],"event":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2023,7,31]]},"location":"Venice, Italy","end":{"date-parts":[[2023,8,2]]}},"container-title":["2023 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224900\/10224823\/10224911.pdf?arnumber=10224911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:51:26Z","timestamp":1695664286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/csr57506.2023.10224911","relation":{},"subject":[],"published":{"date-parts":[[2023,7,31]]}}}