{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:02:21Z","timestamp":1730224941517,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545416","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"194-198","source":"Crossref","is-referenced-by-count":0,"title":["FitBit: Ensuring Robust and Secure Execution Through Runtime-Generated Stressmarks"],"prefix":"10.1109","author":[{"given":"Karthik","family":"Swaminathan","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Ramon","family":"Bertran","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Alper","family":"Buyuktosunoglu","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Pradip","family":"Bose","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The Rocket Chip Generator","volume-title":"EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2016\u201317","author":"Asanovic","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.12"},{"key":"ref3","article-title":"Silent data corruptions at scale","volume-title":"CoRR","volume":"abs\/2102.11245","author":"Dixit","year":"2021"},{"key":"ref4","article-title":"MicroProbe: An Open Source Microbenchmark Generator Ported to the RISC- V ISA","volume-title":"7th RISC- V Workshop","author":"Eldridge","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2019.00009"},{"volume-title":"High Performance SoC Modeling with Verilator","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"volume-title":"LAPACK - Linear Algebra PACKage","key":"ref10"},{"key":"ref11","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.34"},{"volume-title":"SPEC CPU 2017","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2004.1310781"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S.2019.00022"},{"key":"ref17","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","volume-title":"Proceedings of the 27th USENIX Security Symposium","author":"Van Bulck","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783742"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545416.pdf?arnumber=10545416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:10Z","timestamp":1719340150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545416","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}