{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T21:03:17Z","timestamp":1744232597967,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/socc.2018.8618531","type":"proceedings-article","created":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T07:02:38Z","timestamp":1548140558000},"page":"140-145","source":"Crossref","is-referenced-by-count":9,"title":["Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs"],"prefix":"10.1109","author":[{"given":"Fahad","family":"Siddiqui","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hagan","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2591513.2591520"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.369"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.23919\/DATE.2017.7927157","article-title":"Compromising FPGA SoCs using malicious hardware blocks","author":"jacob","year":"2017","journal-title":"Proceedings of Design Automation and Test in Europe Conference and Exhibition (DATE)"},{"key":"ref14","article-title":"A FIPS 140&#x2013;2 Primer for the Zynq-7000 All Programmable SoC","author":"lester","year":"2016","journal-title":"Xilinx Inc White Paper WP467 (v1 1)"},{"journal-title":"Xilinx Inc User Guide UG1228 (v1 0)","article-title":"Zynq UltraScale+ MPSoC Embedded Design Methodology Guide","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2017.8226017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"ref19","article-title":"Downgrade Attack on TrustZone","author":"yue","year":"2017","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref4","first-page":"1","article-title":"Heterogeneous MPSoCs for Mixed Criticality Systems: Challenges and Opportunities","volume":"pp","author":"hassan","year":"2017","journal-title":"IEEE Design & Test"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2017.8226019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2431223"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.sysarc.2017.09.001","article-title":"Towards decentralized system-level security for MPSoC-based embedded applications","volume":"80","author":"benjamin","year":"2017","journal-title":"Journal of Systems Architecture"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DASIP.2016.7853800"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2009.15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331672"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2724579"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315628"},{"journal-title":"Global Field-Programmable Gate Array Market","first-page":"2017","year":"2017","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-3-319-66787-4_21","article-title":"How to Break Secure Boot on FPGA SoCs Through Malicious Hardware","author":"jacob","year":"2017","journal-title":"International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017)"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.micpro.2016.01.013","article-title":"Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls","volume":"42","author":"cotret","year":"2016","journal-title":"Microprocessors and Microsystems"},{"key":"ref21","article-title":"ARMageddon: Last-Level Cache Attacks on Mobile Devices","volume":"abs 1511 4897","author":"moritz","year":"2016","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref24","first-page":"388","article-title":"Protection and the control of information sharing in multics","volume":"17","author":"saltzer","year":"1973","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2017.8226018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0005551000880099"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"}],"event":{"name":"2018 31st IEEE International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2018,9,4]]},"location":"Arlington, VA","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 31st IEEE International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8600278\/8618478\/08618531.pdf?arnumber=8618531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:46:36Z","timestamp":1643240796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8618531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/socc.2018.8618531","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}