{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:44Z","timestamp":1774631504948,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T00:00:00Z","timestamp":1097107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,7]]},"DOI":"10.1145\/1024393.1024403","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"72-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["HIDE"],"prefix":"10.1145","author":[{"given":"Xiaotong","family":"Zhuang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Santosh","family":"Pande","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_3_1","volume-title":"International Symposium on Microarchitecture","author":"Yang J.","year":"2003","unstructured":"J. Yang , Y. Zhang , L. Gao , \" Fast Secure Processor for Inhibiting Software Piracy and Tampering,\" International Symposium on Microarchitecture , Dec. 2003 .]] J.Yang, Y.Zhang, L.Gao, \"Fast Secure Processor for Inhibiting Software Piracy and Tampering,\" International Symposium on Microarchitecture, Dec. 2003.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"International Symposium on Microarchitecture","author":"Suh E.","year":"2003","unstructured":"E. Suh , D. Clarke , B. Gassend , M.v.Dijk, S. Devadas , \" Efficient Memory Integrity Verification and Encryption for Secure Processors\" , International Symposium on Microarchitecture , Dec. 2003 .]] E.Suh, D.Clarke, B.Gassend, M.v.Dijk, S.Devadas, \"Efficient Memory Integrity Verification and Encryption for Secure Processors\", International Symposium on Microarchitecture, Dec. 2003.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"International Symposium on High Performance Computer Architecture","author":"Gassend B.","year":"2003","unstructured":"B. Gassend , G.E. Suh , D. Clarke , M.v.Dijk, S. Devadas , \" Caches and Hash Trees for Efficient Memory Integrity Verification\" , International Symposium on High Performance Computer Architecture , Feb. 2003 .]] B.Gassend, G.E.Suh, D.Clarke, M.v.Dijk, S.Devadas, \"Caches and Hash Trees for Efficient Memory Integrity Verification\", International Symposium on High Performance Computer Architecture, Feb. 2003.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.729797"},{"key":"e_1_3_2_1_8_1","unstructured":"M.Kuhn \"The TrustNo 1 Cryptoprocessor Concept \" CS555 Report Purdue Univ. 1997.]]  M.Kuhn \"The TrustNo 1 Cryptoprocessor Concept \" CS555 Report Purdue Univ. 1997.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_11_1","unstructured":"\"DS5002FP secure microprocessor chip data sheet \" Dallas Semiconductor.]]  \"DS5002FP secure microprocessor chip data sheet \" Dallas Semiconductor.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321925"},{"key":"e_1_3_2_1_13_1","unstructured":"VFLib Graph Matching Library http:\/\/amalfi.dis.unina.it\/ graph\/db\/vflib-2.0\/doc\/vflib-1.html]]  VFLib Graph Matching Library http:\/\/amalfi.dis.unina.it\/ graph\/db\/vflib-2.0\/doc\/vflib-1.html]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"P.C.Kocher \"Timing attacks on implementations of Die-Hellman RSA DSS and other systems \" International Cryptology Conference 1996.]]   P.C.Kocher \"Timing attacks on implementations of Die-Hellman RSA DSS and other systems \" International Cryptology Conference 1996.]]","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_15_1","volume-title":"International Cryptology Conference","author":"Kocher P.","year":"1999","unstructured":"P. Kocher , J. Jaffe , B. Jun , \" Differential Power Analysis\" , International Cryptology Conference , 1999 .]] P.Kocher, J.Jaffe, B.Jun, \"Differential Power Analysis\", International Cryptology Conference, 1999.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Concrete Cresults,\" In Workshop on Cryptographic hardware and Embedded Systems","author":"Gandolfi K.","year":"2001","unstructured":"K. Gandolfi , C. Mourtel , F. Olivier , \" Electromagnetic Analysis : Concrete Cresults,\" In Workshop on Cryptographic hardware and Embedded Systems , 2001 .]] K.Gandolfi, C.Mourtel, F.Olivier, \"Electromagnetic Analysis: Concrete Cresults,\" In Workshop on Cryptographic hardware and Embedded Systems, 2001.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/268806.268810"},{"key":"e_1_3_2_1_18_1","volume-title":"Security Protocols Workshop","author":"Anderson R.","year":"1997","unstructured":"R. Anderson , M. Kuhn , \" Low Cost Attacks on Tamper Resistant Devices ,\" Security Protocols Workshop , 1997 .]] R.Anderson, M.Kuhn, \"Low Cost Attacks on Tamper Resistant Devices,\" Security Protocols Workshop, 1997.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Kelsey B. Schneier D.Wagner and C. Hall \"Side channel cryptanalysis of product ciphers \" European Symposium on Research in Computer Security Sep. 1998]]   J. Kelsey B. Schneier D.Wagner and C. Hall \"Side channel cryptanalysis of product ciphers \" European Symposium on Research in Computer Security Sep. 1998]]","DOI":"10.1007\/BFb0055858"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605403"},{"key":"e_1_3_2_1_21_1","volume-title":"May 26, 2002.]]","author":"Huang A.","unstructured":"A. Huang , \" Keeping Secrets in Hardware : the Microsoft Xbox (TM) Case Study,\" MIT TR. AIM-2002-008 , May 26, 2002.]] A.Huang, \"Keeping Secrets in Hardware: the Microsoft Xbox (TM) Case Study,\" MIT TR. AIM-2002-008, May 26, 2002.]]"},{"key":"e_1_3_2_1_22_1","unstructured":"C. McClure \"Software Reuse Planning by Way of Domain Analysis \" Technical Paper Extended Intelligence Inc. http:\/\/www.reusability.com.]]  C. McClure \"Software Reuse Planning by Way of Domain Analysis \" Technical Paper Extended Intelligence Inc. http:\/\/www.reusability.com.]]"},{"key":"e_1_3_2_1_23_1","unstructured":"D.E.Knuth \"Seminumerical Algorithms \" The Art of Computer Programming Vol. 3 Addison Wesley 1981.]]   D.E.Knuth \"Seminumerical Algorithms \" The Art of Computer Programming Vol. 3 Addison Wesley 1981.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/581630.581651"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/780732.780762"}],"event":{"name":"ASPLOS04: Architectural Support for Programming Languages and Operating Systems","location":"Boston MA USA","acronym":"ASPLOS04","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 11th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1024393.1024403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:31:34Z","timestamp":1750249894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024403"}},"subtitle":["an infrastructure for efficiently protecting information leakage on the address bus"],"short-title":[],"issued":{"date-parts":[[2004,10,7]]},"references-count":25,"alternative-id":["10.1145\/1024393.1024403","10.1145\/1024393"],"URL":"https:\/\/doi.org\/10.1145\/1024393.1024403","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1037949.1024403","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037947.1024403","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037187.1024403","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,10,7]]},"assertion":[{"value":"2004-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}