{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:24:16Z","timestamp":1725809056631},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604197","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T18:59:49Z","timestamp":1287514789000},"page":"125-130","source":"Crossref","is-referenced-by-count":2,"title":["Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards"],"prefix":"10.1109","author":[{"given":"Eugen","family":"Leontie","sequence":"first","affiliation":[]},{"given":"Olga","family":"Gelbart","sequence":"additional","affiliation":[]},{"given":"Bhagirath","family":"Narahari","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Simha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.887799"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proceedings of Advances in Cryptology (CRYPTO)"},{"key":"ref12","first-page":"8494","article-title":"Power analysis attacks against FPGA implementations of the DES","author":"standaert","year":"2004","journal-title":"Proceedings of the International Conference on Field Programmable Logic and Applications (FPL)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","article-title":"An implementation of DES and AES secure against some attacks","author":"akkar","year":"2001","journal-title":"Proc Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.855939"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1289816.1289831"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024403"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1023833.1023873"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"journal-title":"A Taxonomy of Obfuscating Transformations","year":"1997","author":"collberg","key":"ref4"},{"key":"ref3","article-title":"Trusting DRM software","author":"cheng","year":"2001","journal-title":"Workshop on Digital Rights Management for the Web"},{"key":"ref6","article-title":"An overview of security-driven compilation","author":"simha","year":"2004","journal-title":"Proceedings of the Workshop on New Horizons in Compiler Analysis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"key":"ref8","article-title":"Architectural Support for Copy and Tamper Resistant Software","author":"lie","year":"2000","journal-title":"Architectural Support for Programming Languages and Operating Systems (ASPLOS)"},{"key":"ref7","article-title":"Establishing security requirements for more effective and scalable DRM solutions","author":"wyant","year":"2001","journal-title":"Workshop on Digital Rights Management for the Web"},{"key":"ref2","article-title":"A first step towards automated detection of buffer overrun vulnerabilities","author":"wagner","year":"2000","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"ref20","first-page":"90","author":"blum","year":"1994","journal-title":"Checking the correctness of memories"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/2.982917"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref24","article-title":"Data-intensive system benchmark suite analysis and specification","author":"manke","year":"1999","journal-title":"Atlantic Aerospace Electronics Corp"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30117-2_59"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604197.pdf?arnumber=5604197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T16:25:25Z","timestamp":1559751925000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604197","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}