{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:28:15Z","timestamp":1744954095181,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,22]]},"DOI":"10.1109\/ets56758.2023.10174216","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T17:20:34Z","timestamp":1689182434000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Validation, Verification, and Testing (VVT) of future RISC-V powered cloud infrastructures: the Vitamin-V Horizon Europe Project perspective"],"prefix":"10.1109","author":[{"given":"Mart\u00ed","family":"Alonso","sequence":"first","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"David","family":"Andreu","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"Ramon","family":"Canal","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"Stefano","family":"Di Carlo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Torino,Italy"}]},{"given":"Cristiano","family":"Chenet","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Torino,Italy"}]},{"given":"Juanjo","family":"Costa","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"Andreu","family":"Girones","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"Dimitris","family":"Gizopoulos","sequence":"additional","affiliation":[{"name":"University of Athens,Athens,Greece"}]},{"given":"Vasileios","family":"Karakostas","sequence":"additional","affiliation":[{"name":"University of Athens,Athens,Greece"}]},{"given":"Beatriz","family":"Otero","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"George","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"University of Athens,Athens,Greece"}]},{"given":"Eva","family":"Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya,Barcelona,Spain"}]},{"given":"Alessandro","family":"Savino","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Torino,Italy"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2018.2879601"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MECO52532.2021.9460246"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1261391"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.28"},{"key":"ref15","first-page":"935","article-title":"Supporting RISC-V performance counters through performance analysis tools for linux (perf)","author":"domingos","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.044"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref11","first-page":"75","author":"lattner","year":"2004","journal-title":"LLVM A Compilation Framework for Lifelong Program Analysis and Transformation"},{"journal-title":"Micro-architectural features as soft-error induced fault executions markers in embedded safety-critical systems a preliminary study","year":"2023","author":"kasap","key":"ref33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3386377"},{"key":"ref1","article-title":"The RISC-V instruction set manual volume ii: Privileged architecture version 1.9","author":"waterman","year":"2016","journal-title":"Tech Rep"},{"journal-title":"Pattern Classification","year":"2000","author":"duda","key":"ref39"},{"journal-title":"The gem5 simulator Version 20 0+","year":"2020","author":"lowe-power","key":"ref17"},{"journal-title":"A survey of hardware-based malware detection approach","year":"2023","author":"chenet","key":"ref38"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2000.10029"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"journal-title":"SemiDynamics High Bandwidth Vector-capable RISC-V Cores","year":"0","key":"ref18"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22155621"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"ref26","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"journal-title":"The Hundred-Page Machine Learning Book","year":"2019","author":"burkov","key":"ref42"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046596"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.003"},{"key":"ref43","first-page":"1","article-title":"Ensemble learning for effective runtime hardware-based malware detection: A comprehensive analysis and classification","author":"sayadi","year":"2018","journal-title":"2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC) DAC"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927041"},{"journal-title":"VirusShare","year":"0","key":"ref28"},{"journal-title":"VirusTotal","year":"0","key":"ref27"},{"key":"ref29","first-page":"149","article-title":"{SourceFinder}: Finding malware {Source-Code} from publicly available repositories in {GitHub}","author":"rokon","year":"2020","journal-title":"23rd International Symposium on Research in Attacks Intrusions and Defenses (RAID 2020)"},{"journal-title":"Gem5","year":"0","key":"ref8"},{"journal-title":"RISCV-QEMU","year":"0","key":"ref7"},{"journal-title":"Amazon F1","year":"0","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174125"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3457388.3458657"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323432"},{"journal-title":"European Processor Initiative","year":"0","key":"ref5"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1098\/rspl.1895.0041","article-title":"Note on regression and inheritance in the case of two parents","volume":"58","author":"pearson","year":"1895","journal-title":"Proc R Soc Lond"}],"event":{"name":"2023 IEEE European Test Symposium (ETS)","start":{"date-parts":[[2023,5,22]]},"location":"Venezia, Italy","end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE European Test Symposium (ETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10173930\/10173940\/10174216.pdf?arnumber=10174216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T17:55:50Z","timestamp":1690912550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10174216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ets56758.2023.10174216","relation":{},"subject":[],"published":{"date-parts":[[2023,5,22]]}}}