{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:24:52Z","timestamp":1764937492271,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/dft56152.2022.9962340","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T15:55:13Z","timestamp":1669910113000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Preventing Soft Errors and Hardware Trojans in RISC-V Cores"],"prefix":"10.1109","author":[{"given":"Edian B.","family":"Annink","sequence":"first","affiliation":[{"name":"University of Twente,Enschede,the Netherlands"}]},{"given":"Gerard","family":"Rauwerda","sequence":"additional","affiliation":[{"name":"Technolution B.V.,Gouda,the Netherlands"}]},{"given":"Edwin","family":"Hakkennes","sequence":"additional","affiliation":[{"name":"Technolution B.V.,Gouda,the Netherlands"}]},{"given":"Alessandra","family":"Menicucci","sequence":"additional","affiliation":[{"name":"Delft University of Technology,Delft,the Netherlands"}]},{"given":"Stefano Di","family":"Mascio","sequence":"additional","affiliation":[{"name":"Delft University of Technology,Delft,the Netherlands"}]},{"given":"Gianluca","family":"Furano","sequence":"additional","affiliation":[{"name":"European Space Agency, European Space Research and Technology Centre,Noordwijk,the Netherlands"}]},{"given":"Marco","family":"Ottavi","sequence":"additional","affiliation":[{"name":"University of Twente,Enschede,the Netherlands"}]}],"member":"263","reference":[{"journal-title":"Frenox risc-v softcore","year":"2022","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS48698.2020.9081185"},{"journal-title":"Towards a fault tolerant RISC-V softcore","year":"2016","author":"heida","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2017.09.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SpaceComp.2019.00008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2006.21"},{"key":"ref15","article-title":"A survey on RISC-V security: Hardware and architecture","volume":"abs 2107 4175","author":"lu","year":"2021","journal-title":"CoRR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240854"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61078-4_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS48698.2020.9080961"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368630"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0873"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1594233.1594330"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2020.3033188"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"journal-title":"cocotb &#x2013; python verification framework","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11973-7_37"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781118084328"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54422-9_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52794-5_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2015.2508981"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DFT52944.2021.9568291"},{"key":"ref22","article-title":"Probabilistic data structures and algorithms for big data applications","author":"gakhov","year":"2019","journal-title":"Books on Demand"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3024680"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2014.6868793"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.174"}],"event":{"name":"2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","start":{"date-parts":[[2022,10,19]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9962319\/9962334\/09962340.pdf?arnumber=9962340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T15:09:27Z","timestamp":1671462567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9962340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dft56152.2022.9962340","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}