{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:12:58Z","timestamp":1761664378830},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/dac18074.2021.9586248","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:30:34Z","timestamp":1636414234000},"source":"Crossref","is-referenced-by-count":9,"title":["A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Muller","sequence":"first","affiliation":[]},{"given":"Mohammad Rahmani","family":"Fadiheh","sequence":"additional","affiliation":[]},{"given":"Anna Lena Duque","family":"Anton","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Stoffel","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Kunz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref11","first-page":"337","article-title":"Verifying Information Flow Properties of Firmware Using Symbolic Execution","author":"pramod subramanyan","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2018.8556946"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16458-4_27"},{"key":"ref14","first-page":"1","article-title":"Formal security verification of concurrent firmware in socs using instruction-level abstraction for hardware","author":"huang","year":"2018","journal-title":"IEEE\/ACM Design Automation Conference (DAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3265723.3265724"},{"key":"ref16","article-title":"Hardware-software contracts for secure speculation","author":"guarnieri","year":"2020","journal-title":"arXiv preprint arXiv 2006 04989"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"ref18","first-page":"313","article-title":"Formal verification of taint-propagation security properties in a commercial SoC design","author":"subramanyan","year":"2014","journal-title":"Proc Design Automation and Test in Europe (DATE) Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218572"},{"key":"ref4","first-page":"1","article-title":"Key-stone: An open framework for architecting trusted execution environments","author":"lee","year":"2020","journal-title":"European Conf on Computer Systems (EuroSys)"},{"key":"ref3","year":"0","journal-title":"ARM TrustZone Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715004"},{"key":"ref5","first-page":"213","article-title":"Hardfails: Insights into software-exploitable hardware bugs","author":"dessouky","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"ref7","year":"0","journal-title":"Symbolic pmp ip"},{"key":"ref2","year":"0","journal-title":"Common Weakness Enumeration"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_15"},{"key":"ref1","first-page":"753","article-title":"Security as a new dimension in embedded system design","author":"kocher","year":"2004","journal-title":"IEEE\/ACM Design Automation Conference (DAC)"},{"key":"ref20","article-title":"Spectre attacks: Exploiting speculative execution","author":"kocher","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2020.2994016"},{"key":"ref21","article-title":"Meltdown","author":"lipp","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"key":"ref24","year":"0","journal-title":"PULPissimo"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2285276"},{"key":"ref25","author":"asanovic","year":"2016","journal-title":"The rocket chip generator"}],"event":{"name":"2021 58th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2021,12,5]]},"end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 58th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9585997\/9586083\/09586248.pdf?arnumber=9586248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:51Z","timestamp":1652201751000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9586248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dac18074.2021.9586248","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}