{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:19:05Z","timestamp":1729631945529,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/iccd.2009.5413140","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T13:35:32Z","timestamp":1266413732000},"page":"289-296","source":"Crossref","is-referenced-by-count":8,"title":["SHIELDSTRAP: Making secure processors truly secure"],"prefix":"10.1109","author":[{"given":"Siddhartha","family":"Chhabra","sequence":"first","affiliation":[]},{"given":"Brian","family":"Rogers","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Solihin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SESC","year":"2004","author":"renau","key":"ref39"},{"journal-title":"Intel cancels pentium p4","year":"2004","author":"krewell","key":"ref38"},{"journal-title":"Federal Information Processing Standards","article-title":"Digital Signature Standard (AES)","year":"1994","key":"ref33"},{"journal-title":"Windows Logo Program","year":"0","key":"ref32"},{"journal-title":"Federal Information Processing Standards","article-title":"Secure Hash Standard","year":"1995","key":"ref31"},{"journal-title":"RSA Cryptography Standard","year":"1993","key":"ref30"},{"journal-title":"MOSIS","year":"0","key":"ref37"},{"key":"ref36","volume":"ii","author":"rabaey","year":"2002","journal-title":"Digital Integrated Circuits A Desing Perspective"},{"journal-title":"eEye BootRoot","year":"2005","author":"soeder","key":"ref35"},{"journal-title":"Implementing and detecting a PCI rootkit","year":"2006","author":"heasman","key":"ref34"},{"journal-title":"IBM Extends Enhanced Data Security to Consumer Electronics Products","year":"2006","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199335"},{"key":"ref12","article-title":"Architectural Support for Copy and Tamper Resistant Software","author":"lie","year":"2000","journal-title":"Proc of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"ref14","article-title":"Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems","author":"shi","year":"2004","journal-title":"Proceedings.International Conference on Parallel Architectures and Compilation Techniques"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/1080695.1069972","article-title":"High Efficiency Counter Mode Security Architecture via Prediction and Precomputation","author":"shi","year":"2005","journal-title":"Proc 32nd Int'l Symp Computer Architecture"},{"key":"ref16","article-title":"Towards the Issues in Architectural Support for Protection of Software Execution","author":"shi","year":"2004","journal-title":"Workshop on Architectural Support for Security and Anti-Virus"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1145\/1150019.1136502","article-title":"Improving Cost, Performance, and Security of Memory Encryption and Authentication","author":"yan","year":"2006","journal-title":"Proc of the International Symposium on Computer Architecture"},{"journal-title":"The Cell Broadband Engine Processor Security Architecture","year":"2006","key":"ref28"},{"journal-title":"modchipoutlet com","year":"0","key":"ref4"},{"year":"2008","key":"ref27","article-title":"Quarterly Report PandaLabs"},{"journal-title":"modchip com","year":"0","key":"ref3"},{"journal-title":"wii-modchips com","year":"0","key":"ref6"},{"journal-title":"Sony Playstation 3 modchips","year":"2008","key":"ref29"},{"journal-title":"modchip com","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/12.729797"},{"year":"2005","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1999.794507"},{"journal-title":"americanxboxmodchips com","year":"0","key":"ref1"},{"key":"ref20","article-title":"Fast Secure Processor for Inhibiting Software Piracy and Tampering","author":"yang","year":"2003","journal-title":"Proceedings of the 36th Annual International Symposium on Microarchitecture"},{"journal-title":"TCG PC Client Specific Implementation Specification For Conventional BIOS","year":"2006","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"journal-title":"Crypto++ version 5 5 1","year":"1995","author":"dai","key":"ref42"},{"journal-title":"Arm Trustzone","year":"2004","key":"ref24"},{"key":"ref41","article-title":"ChipLock: Support for Secure Microarchitectures","author":"kgil","year":"2004","journal-title":"Workshop on Architectural Support for Security and Anti-Virus"},{"key":"ref23","article-title":"Personal Secure Booting","author":"itoi","year":"2001","journal-title":"Proc of the Sixth Australian Conference on Information Security and Privacy"},{"key":"ref26","article-title":"Direct Anonymous Attestat","author":"brickell","year":"2004","journal-title":"ACM Conference on Computer and Communications Security"},{"journal-title":"DS5002FP Secure Microprocessor Chip","article-title":"Maxim\/Dallas Semiconductor","year":"2007","key":"ref25"}],"event":{"name":"2009 IEEE International Conference on Computer Design (ICCD 2009)","start":{"date-parts":[[2009,10,4]]},"location":"Lake Tahoe, CA, USA","end":{"date-parts":[[2009,10,7]]}},"container-title":["2009 IEEE International Conference on Computer Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5406656\/5413104\/05413140.pdf?arnumber=5413140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:56:07Z","timestamp":1497833767000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5413140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/iccd.2009.5413140","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}