{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:36:53Z","timestamp":1729665413948,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/iccd.2012.6378624","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:52:22Z","timestamp":1355867542000},"page":"102-107","source":"Crossref","is-referenced-by-count":9,"title":["A high-performance, low-overhead microarchitecture for secure program execution"],"prefix":"10.1109","author":[{"given":"Arun K.","family":"Kanuparthi","sequence":"first","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]},{"given":"Gaston","family":"Ormazabal","sequence":"additional","affiliation":[]},{"given":"Sateesh K.","family":"Addepalli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"168","article-title":"Architecturual Support for Copy and Tamper Resistant Software","author":"lie","year":"0","journal-title":"Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems November 2000"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"journal-title":"Vulnerability notes database","year":"2011","key":"17"},{"journal-title":"SPEC CPU2006","year":"2008","key":"23"},{"key":"18","first-page":"275","article-title":"Cyclone: A Safe Dialect of C","author":"jim","year":"2002","journal-title":"Proc of the General Track 2002 USENIX Annual Technical Conference June 10-15 2002 Monterey California USA"},{"journal-title":"Valgrind Exp-bbv - Basic Block Vector Generation Tool","year":"0","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"16","article-title":"0wned by an iPod","author":"dornseif","year":"0","journal-title":"Proc of the 2nd PacSec Applied Security Conference November 2004"},{"key":"13","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/605397.605409","article-title":"Enabling Trusted Software Integrity","volume":"october","author":"kirovski","year":"2002","journal-title":"Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating Systems"},{"journal-title":"Evil Maid Goes After TrueCrypt!","year":"2009","author":"rutkowska","key":"14"},{"key":"11","first-page":"1","article-title":"Feasibility Study of On-chip Dynamic Trusted Platform Module","author":"kanuparthi","year":"0","journal-title":"Proc of IEEE International Conference on Computer Design October 2010"},{"key":"12","first-page":"530","article-title":"CODESSEAL: Compiler\/FPGA Approach to Secure Applications","author":"gelbart","year":"0","journal-title":"Proc of the IEEE International Conference on Intelligence and Security Informatics May 2005"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SBAC-PAD.2007.17"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364446"},{"key":"20","first-page":"237","article-title":"Enlisting hardware architecture to thwart malicious code injection","author":"lee","year":"0","journal-title":"Proc of International Conference on Security in Pervasive Computing March 2003"},{"journal-title":"Enterprise Data Center Security with Software Defined Networking","year":"2012","author":"recio","key":"2"},{"journal-title":"IPhone Security Bug Lets Innocent Looking Apps Go Bad","year":"2011","author":"greenberg","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2004.1347961"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"5","first-page":"63","article-title":"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks","author":"cowan","year":"0","journal-title":"Proceedings of the 7th USENIX Security Symposium Jan 1998"},{"journal-title":"Trusted Platform Module (TPM) Summary","year":"2008","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676899"},{"key":"8","first-page":"191","article-title":"Secure Execution via Program Shepherding","author":"kiriansky","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"}],"event":{"name":"2012 IEEE 30th International Conference on Computer Design (ICCD 2012)","start":{"date-parts":[[2012,9,30]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2012,10,3]]}},"container-title":["2012 IEEE 30th International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362370\/6378602\/06378624.pdf?arnumber=6378624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:23:14Z","timestamp":1498018994000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccd.2012.6378624","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}