{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:09:40Z","timestamp":1725700180872},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1109\/iolts59296.2023.10224868","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T13:50:13Z","timestamp":1693230613000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Microarchitecture-Aware Timing Error Prediction via Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Styliani","family":"Tompazi","sequence":"first","affiliation":[{"name":"Institute of Electronics, Communications and Information Technology, Queen&#x0027;s University Belfast,UK"}]},{"given":"Georgios","family":"Karakonstantis","sequence":"additional","affiliation":[{"name":"Institute of Electronics, Communications and Information Technology, Queen&#x0027;s University Belfast,UK"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.249935"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744805"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1840845.1840871"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00074"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3217212"},{"key":"ref37","article-title":"Using genetic algorithms in test data generation: A critical systematic mapping","author":"rodrigues","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342175"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoinf.2020.101137"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC47752.2019.9041963"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00035"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3191966"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-017-0649-0"},{"key":"ref10","first-page":"112","article-title":"tunable replica circuits and adaptive voltage-frequency techniques for dynamic voltage, temperature, and aging variation tolerance","author":"tschanz","year":"2009","journal-title":"2009 Symposium on VLSI Circuits VLSIC"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.3012045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.52"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2749423"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714942"},{"journal-title":"Static Timing Analysis for Nanometer Designs A Practical Approach","year":"2009","author":"bhasker","key":"ref39"},{"key":"ref16","article-title":"Protecting the control flow of embedded processors against fault attacks","author":"werner","year":"2015","journal-title":"CARDIS"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.06.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/775919.775920"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2007.4397266"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137017"},{"key":"ref46","article-title":"A transprecision floating-point platform for ultra-low power computing","author":"tagliavini","year":"2018","journal-title":"DATE 2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116363"},{"journal-title":"Openrisc community &#x201C; openrisc 1000 architecture manual &#x201D;","year":"2014","author":"architecture","key":"ref45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2983127"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3295500.3356184"},{"journal-title":"Efficient transparent and comprehensive runtime code manipulation","year":"2004","author":"bruening","key":"ref47"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2010.2089657"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/125826.125925"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417549"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2223467"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"ref21","article-title":"Harnessing voltage margins for energy efficiency in multicore cpus","author":"papadimitriou","year":"2017","journal-title":"Micro"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2005.9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927168"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2783333"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3033627"},{"key":"ref8","first-page":"1445","article-title":"VOLTpwn: Attacking x86 processor integrity from software","author":"kenjar","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref9","article-title":"Estimating code vulnerability to timing errors via microarchitecture-aware machine learning","author":"tompazi","year":"2021","journal-title":"IEEE D&T"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898095"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC53511.2021.00022"},{"key":"ref6","article-title":"Electrical-level attacks on cpus, fpgas, and gpus: Survey and implications in the heterogeneous era","author":"mahmoud","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218588"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.130"}],"event":{"name":"2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS)","start":{"date-parts":[[2023,7,3]]},"location":"Crete, Greece","end":{"date-parts":[[2023,7,5]]}},"container-title":["2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224820\/10224858\/10224868.pdf?arnumber=10224868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:43:20Z","timestamp":1695044600000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/iolts59296.2023.10224868","relation":{},"subject":[],"published":{"date-parts":[[2023,7,3]]}}}