{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:38:00Z","timestamp":1725705480493},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/dft.2015.7315131","type":"proceedings-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T22:49:30Z","timestamp":1447109370000},"page":"29-34","source":"Crossref","is-referenced-by-count":7,"title":["On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks"],"prefix":"10.1109","author":[{"given":"Jerry","family":"Backer","sequence":"first","affiliation":[]},{"given":"David","family":"Hely","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-06242-6","author":"vermeulen","year":"2014","journal-title":"Debugging Systems-on-Chip Communication-centric and Abstraction-based Techniques"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676899"},{"key":"ref12","article-title":"The FNV non-cryptographic hash algorithm","author":"fowler","year":"2012","journal-title":"Technical Report IETF Internet Draft"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2009.5270820"},{"journal-title":"Cadence","article-title":"Encounter User Guide","year":"2008","key":"ref14"},{"article-title":"CCACTI 5.3","year":"0","author":"labs","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2009.44"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024954"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086308"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1655077.1655083"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2012.42"},{"journal-title":"Intel","article-title":"Intel Trace Hub-Developer's Manual","year":"2015","key":"ref8"},{"journal-title":"ARM","article-title":"CoreSight Components-Technical Reference Manual","year":"2009","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378624"},{"key":"ref9","first-page":"6","article-title":"Half-blind Attacks: Mask ROM Bootloaders Are Dangerous","author":"goodspeed","year":"2009","journal-title":"WOOT"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2007.32"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046596"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962098"},{"key":"ref23","first-page":"447","article-title":"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing","author":"pappas","year":"2013","journal-title":"Sec"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360535"}],"event":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","start":{"date-parts":[[2015,10,12]]},"location":"Amherst, MA, USA","end":{"date-parts":[[2015,10,14]]}},"container-title":["2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7304347\/7315124\/07315131.pdf?arnumber=7315131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T20:08:52Z","timestamp":1692130132000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7315131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dft.2015.7315131","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}