{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:00Z","timestamp":1750308120699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,24]],"date-time":"2005-09-24T00:00:00Z","timestamp":1127520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,24]]},"DOI":"10.1145\/1086297.1086337","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"304-314","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Micro embedded monitoring for security in application specific instruction-set processors"],"prefix":"10.1145","author":[{"given":"Roshan G.","family":"Ragel","sequence":"first","affiliation":[{"name":"The University of New South Wales (UNSW) and National ICT Australia, Sydney, Australia"}]},{"given":"Sri","family":"Parameswaran","sequence":"additional","affiliation":[{"name":"The University of New South Wales (UNSW) and National ICT Australia, Sydney, Australia"}]},{"given":"Sayed Mohammad","family":"Kia","sequence":"additional","affiliation":[{"name":"Abbaspour University, Tehran, Iran (visiting UNSW, Sydney)"}]}],"member":"320","published-online":{"date-parts":[[2005,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advanced RISC Machines Ltd","author":"Arm Reference Manual","year":"2000","unstructured":"Arm Reference Manual , Advanced RISC Machines Ltd . 2000 .]] Arm Reference Manual, Advanced RISC Machines Ltd. 2000.]]"},{"unstructured":"ASIP Meister Tutorial PEAS PROJECT. 2003.]]  ASIP Meister Tutorial PEAS PROJECT. 2003.]]","key":"e_1_3_2_1_2_1"},{"unstructured":"ASIP Meister User Manual PEAS PROJECT. 2003.]]  ASIP Meister User Manual PEAS PROJECT. 2003.]]","key":"e_1_3_2_1_3_1"},{"unstructured":"ASIP Meister Available at http:\/\/www.eda-meister.org\/asip-meister.]]  ASIP Meister Available at http:\/\/www.eda-meister.org\/asip-meister.]]","key":"e_1_3_2_1_4_1"},{"unstructured":"The GCC Team GNU\/GCC Compiler Free Software Foundation.]]  The GCC Team GNU\/GCC Compiler Free Software Foundation.]]","key":"e_1_3_2_1_5_1"},{"unstructured":"An Introduction to Thumb Advanced RISC Machines Ltd. 1995.]]  An Introduction to Thumb Advanced RISC Machines Ltd. 1995.]]","key":"e_1_3_2_1_6_1"},{"volume-title":"Merriam-Webster's Online Dictionary","unstructured":"Merriam-Webster's Online Dictionary , 10 th Edition, Available at http:\/\/www.m-w.com.]] Merriam-Webster's Online Dictionary, 10th Edition, Available at http:\/\/www.m-w.com.]]","edition":"10","key":"e_1_3_2_1_7_1"},{"unstructured":"Perl Programming Language Available at http:\/\/www.perl.org.]]  Perl Programming Language Available at http:\/\/www.perl.org.]]","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"The SANS\/FBI Twenty Most Critical Internet Security Vulnerabilities","author":"The SANS Institute","year":"2004","unstructured":"The SANS Institute , The SANS\/FBI Twenty Most Critical Internet Security Vulnerabilities . 2004 .]] The SANS Institute, The SANS\/FBI Twenty Most Critical Internet Security Vulnerabilities. 2004.]]"},{"volume-title":"PEAS- I: A Hardware\/Software Co-design System for ASIPs. IEEE International Test Conference","author":"Alomary A.","unstructured":"Alomary , A. , T. Nakata , and Y. Honma , PEAS- I: A Hardware\/Software Co-design System for ASIPs. IEEE International Test Conference , 1993: p. 2--7.]] Alomary, A., T. Nakata, and Y. Honma, PEAS- I: A Hardware\/Software Co-design System for ASIPs. IEEE International Test Conference, 1993: p. 2--7.]]","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Transparent Run-Time Defense Against Stack Smashing Attacks","author":"Baratloo A.","year":"2000","unstructured":"Baratloo , A. , N. Singh , and T. Tsai , Transparent Run-Time Defense Against Stack Smashing Attacks . 2000 .]] Baratloo, A., N. Singh, and T. Tsai, Transparent Run-Time Defense Against Stack Smashing Attacks. 2000.]]"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","volume-title":"On the Importance of Checking Cryptographic Protocols for Faults","author":"Boneh D.","year":"1997","unstructured":"Boneh , D. , R.A. DeMillo , and R.J. Lipton , On the Importance of Checking Cryptographic Protocols for Faults . Lecture Notes in Computer Science , 1997 p. 37--51.]] Boneh, D., R.A. DeMillo, and R.J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults. Lecture Notes in Computer Science, 1997 p. 37--51.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Defeating Overflow Attacks The SANS Institute","author":"Deckard J.","year":"2004","unstructured":"Deckard , J. , Defeating Overflow Attacks The SANS Institute 2004 .]] Deckard, J., Defeating Overflow Attacks The SANS Institute 2004.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/2.955100"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/CODES+ISSS.2004.38"},{"volume-title":"Design of Energy-Efficient Application-Specific Instruction Set Processors (ASIPs)","author":"Glokler T.","unstructured":"Glokler , T. and H. Meyr , Design of Energy-Efficient Application-Specific Instruction Set Processors (ASIPs) . First Edition ed. 2002: Kluwer Academic Publishers .]] Glokler, T. and H. Meyr, Design of Energy-Efficient Application-Specific Instruction Set Processors (ASIPs). First Edition ed. 2002: Kluwer Academic Publishers.]]","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_18_1","volume-title":"Information Leakage Attacks Agaist Smart Card Implementations of Cryptographic Algorithms and Countermeasures","author":"Hess E.","year":"2000","unstructured":"Hess , E. , et al. , Information Leakage Attacks Agaist Smart Card Implementations of Cryptographic Algorithms and Countermeasures . 2000 . p. 55--64.]] Hess, E., et al., Information Leakage Attacks Agaist Smart Card Implementations of Cryptographic Algorithms and Countermeasures. 2000. p. 55--64.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention","author":"Joglekar S.P.","year":"2004","unstructured":"Joglekar , S.P. and S.R. Tate , ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention . 2004 , IEEE Computer Society .]] Joglekar, S.P. and S.R. Tate, ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. 2004, IEEE Computer Society.]]"},{"key":"e_1_3_2_1_20_1","volume-title":"Countering code-injection attacks with instruction-set randomization","author":"Kc G.S.","year":"2003","unstructured":"Kc , G.S. , A.D. Keromytis , and V. Prevelakis , Countering code-injection attacks with instruction-set randomization . 2003 , ACM Press . p. 272--280.]] Kc, G.S., A.D. Keromytis, and V. Prevelakis, Countering code-injection attacks with instruction-set randomization. 2003, ACM Press. p. 272--280.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Side Channel Cryptanalysis of Product Ciphers","author":"Kelsey J.","year":"1998","unstructured":"Kelsey , J. , et al. , Side Channel Cryptanalysis of Product Ciphers . 1998 . p. 97--110.]] Kelsey, J., et al., Side Channel Cryptanalysis of Product Ciphers. 1998. p. 97--110.]]"},{"key":"e_1_3_2_1_22_1","first-page":"9","author":"Kmmerling O.","year":"1999","unstructured":"Kmmerling , O. and M.G. Kuhn , Design Principles for Tamper-Resistant Smartcard Processors. 1999 . p. 9 -- 20 .]] Kmmerling, O. and M.G. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors. 1999. p. 9--20.]]","journal-title":"Design Principles for Tamper-Resistant Smartcard Processors."},{"key":"e_1_3_2_1_23_1","volume-title":"Security as a New Dimension in Embedded System Design","author":"Kocher P.","year":"2004","unstructured":"Kocher , P. , et al. , Security as a New Dimension in Embedded System Design . 2004 .]] Kocher, P., et al., Security as a New Dimension in Embedded System Design. 2004.]]"},{"key":"e_1_3_2_1_24_1","volume-title":"Enlisting Hardware Architecture to Thwart Malicious Code Injection","author":"Lee R.","year":"2003","unstructured":"Lee , R. , et al. , Enlisting Hardware Architecture to Thwart Malicious Code Injection . 2003 , Springer Verlag LNCS. ]] Lee, R., et al., Enlisting Hardware Architecture to Thwart Malicious Code Injection. 2003, Springer Verlag LNCS.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/12.2145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/CODES+ISSS.2004.52"},{"key":"e_1_3_2_1_27_1","volume-title":"A Processor Architecture Defense against Buffer Overflow Attacks","author":"McGregor J.","year":"2003","unstructured":"McGregor , J. , et al. , A Processor Architecture Defense against Buffer Overflow Attacks . 2003 , Springer Verlag . p. 237--252.]] McGregor, J., et al., A Processor Architecture Defense against Buffer Overflow Attacks. 2003, Springer Verlag. p. 237--252.]]"},{"key":"e_1_3_2_1_28_1","volume-title":"Current flattening in software and hardware for security applications","author":"Muresan R.","year":"2004","unstructured":"Muresan , R. and C.H. Gebotys , Current flattening in software and hardware for security applications . 2004 , ACM Press . p. 218--223.]] Muresan, R. and C.H. Gebotys, Current flattening in software and hardware for security applications. 2004, ACM Press. p. 218--223.]]"},{"key":"e_1_3_2_1_29_1","volume-title":"An Architectural Framework for Providing Reliability and Security Support","author":"Nakka N.","year":"2004","unstructured":"Nakka , N. , et al. , An Architectural Framework for Providing Reliability and Security Support . 2004 , IEEE Computer Society .]] Nakka, N., et al., An Architectural Framework for Providing Reliability and Security Support. 2004, IEEE Computer Society.]]"},{"key":"e_1_3_2_1_30_1","first-page":"179","author":"Quisquater J.J.","year":"2002","unstructured":"Quisquater , J.J. and D. Samyde , Side Channel Cryptanalysis. 2002 . p. 179 -- 184 .]] Quisquater, J.J. and D. Samyde, Side Channel Cryptanalysis. 2002. p. 179--184.]]","journal-title":"Side Channel Cryptanalysis."},{"key":"e_1_3_2_1_31_1","volume-title":"Soft Error Detection and Recovery in Application Specific Instruction-set Processors","author":"Ragel R.G.","year":"2005","unstructured":"Ragel , R.G. and S. Parameswaran , Soft Error Detection and Recovery in Application Specific Instruction-set Processors . 2005 .]] Ragel, R.G. and S. Parameswaran, Soft Error Detection and Recovery in Application Specific Instruction-set Processors. 2005.]]"},{"key":"e_1_3_2_1_32_1","volume-title":"Embedded Systems.","author":"Ravi S.","year":"2004","unstructured":"Ravi , S. , A. Raghunathan , and S. Chakradhar , Tamper Resistance Mechanisms for Secure , Embedded Systems. 2004 .]] Ravi, S., A. Raghunathan, and S. Chakradhar, Tamper Resistance Mechanisms for Secure, Embedded Systems. 2004.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_3_2_1_34_1","volume-title":"Transient fault detection via simultaneous multithreading","author":"Reinhardt S.K.","year":"2000","unstructured":"Reinhardt , S.K. and S.S. Mukherjee , Transient fault detection via simultaneous multithreading . 2000 , ACM Press . p. 25--36.]] Reinhardt, S.K. and S.S. Mukherjee, Transient fault detection via simultaneous multithreading. 2000, ACM Press. p. 25--36.]]"},{"key":"e_1_3_2_1_35_1","volume-title":"Four different tricks to bypass StackShield and StackGuard protection","author":"Richarte G.","year":"2002","unstructured":"Richarte , G. , Four different tricks to bypass StackShield and StackGuard protection . 2002 .]] Richarte, G., Four different tricks to bypass StackShield and StackGuard protection. 2002.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.5555\/647348.724331"},{"key":"e_1_3_2_1_37_1","volume-title":"Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks","author":"Shao Z.","year":"2004","unstructured":"Shao , Z. , et al. , Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks . 2004 , IEEE Computer Society .]] Shao, Z., et al., Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. 2004, IEEE Computer Society.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"Defending Embedded Systems Against Buffer Overflow via Hardware\/Software","author":"Shao Z.","year":"2003","unstructured":"Shao , Z. , et al. , Defending Embedded Systems Against Buffer Overflow via Hardware\/Software . 2003 , IEEE Computer Society . p. 352.]] Shao, Z., et al., Defending Embedded Systems Against Buffer Overflow via Hardware\/Software. 2003, IEEE Computer Society. p. 352.]]"},{"key":"e_1_3_2_1_39_1","volume-title":"MIDL - a microinstruction description language","author":"Sint M.","year":"1981","unstructured":"Sint , M. , MIDL - a microinstruction description language . 1981 , IEEE Press . p. 95--106.]] Sint, M., MIDL - a microinstruction description language. 1981, IEEE Press. p. 95--106.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.5555\/324119.324128"},{"key":"e_1_3_2_1_41_1","volume-title":"AEGIS: Architecture for tamper-evident and tamper-resistant processing","author":"Suh G.","year":"2003","unstructured":"Suh , G. , et al. , AEGIS: Architecture for tamper-evident and tamper-resistant processing . 2003 .]] Suh, G., et al., AEGIS: Architecture for tamper-evident and tamper-resistant processing. 2003.]]"},{"key":"e_1_3_2_1_42_1","volume-title":"Hardware mechanisms for memory integrity checking","author":"Suh G.","year":"2002","unstructured":"Suh , G. , et al. , Hardware mechanisms for memory integrity checking . 2002 .]] Suh, G., et al., Hardware mechanisms for memory integrity checking. 2002.]]"},{"key":"e_1_3_2_1_43_1","first-page":"3","volume-title":"CA.","author":"Wagner D.","unstructured":"Wagner , D. , et al. , A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. 2000: San Diego , CA. p. 3 -- 17 .]] Wagner, D., et al., A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. 2000: San Diego, CA. p. 3--17.]]"},{"key":"e_1_3_2_1_44_1","volume-title":"Smart Card Handbook","author":"Wiley R.","year":"2000","unstructured":"Wiley , R. and E. Wiley , Smart Card Handbook . 2000 .]] Wiley, R. and E. Wiley, Smart Card Handbook. 2000.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/12.588046"},{"key":"e_1_3_2_1_46_1","volume-title":"Suppl. of IEEE International Conf. on Dependable Systems and Networks (DSN), San Francesco, CA","author":"Xu J.","year":"2003","unstructured":"Xu , J. , Intrusion Prevention Using Control Data Randomization , in Suppl. of IEEE International Conf. on Dependable Systems and Networks (DSN), San Francesco, CA 2003 .]] Xu, J., Intrusion Prevention Using Control Data Randomization, in Suppl. of IEEE International Conf. on Dependable Systems and Networks (DSN), San Francesco, CA 2003.]]"},{"key":"e_1_3_2_1_47_1","volume-title":"Transparent Runtime Randomization for Security","author":"Xu J.","year":"2003","unstructured":"Xu , J. , Z. Kalbarczyk , and R.K. Iyer , Transparent Runtime Randomization for Security . 2003 , IEEE Computer Society .]] Xu, J., Z. Kalbarczyk, and R.K. Iyer, Transparent Runtime Randomization for Security. 2003, IEEE Computer Society.]]"},{"key":"e_1_3_2_1_48_1","volume-title":"Architecture support for defending against buffer overflow attacks","author":"Xu J.","year":"2002","unstructured":"Xu , J. , et al. , Architecture support for defending against buffer overflow attacks . 2002 .]] Xu, J., et al., Architecture support for defending against buffer overflow attacks. 2002.]]"},{"key":"e_1_3_2_1_49_1","volume-title":"An Architectural Framework for Providing Security and Dependability Support","author":"Xu J.","year":"2004","unstructured":"Xu , J. et al ., An Architectural Framework for Providing Security and Dependability Support , 2004 .]] Xu, J. et al., An Architectural Framework for Providing Security and Dependability Support, 2004.]]"},{"key":"e_1_3_2_1_50_1","volume-title":"Master's Thesis","author":"Vetteth A.","year":"2005","unstructured":"Vetteth , A. , Hardware Implementation of Reconfigurable Modules for Reliability and Security Engine , Master's Thesis , University of Illinois at Urbana Champaign , May 2005 .]] Vetteth, A., Hardware Implementation of Reconfigurable Modules for Reliability and Security Engine, Master's Thesis, University of Illinois at Urbana Champaign, May 2005.]]"},{"unstructured":"H. Eveking Superscalar DLX Documentation http:\/\/www.rs.e-technik.tu-darmstadt.de\/TUD\/res\/dlxdocu\/DlxPdf.zip.]]  H. Eveking Superscalar DLX Documentation http:\/\/www.rs.e-technik.tu-darmstadt.de\/TUD\/res\/dlxdocu\/DlxPdf.zip.]]","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/309847.309923"},{"key":"e_1_3_2_1_53_1","volume-title":"Custom-Fit Processors: Letting Applications Define Architectures. International Symposium on Microarchitecture, Micro-29","author":"Fisher J. A.","year":"1996","unstructured":"Fisher , J. A. , Faraboschi, P. , and Desoli , G . Custom-Fit Processors: Letting Applications Define Architectures. International Symposium on Microarchitecture, Micro-29 , Paris, France , 1996 , 324--335.]] Fisher, J. A., Faraboschi, P., and Desoli, G. Custom-Fit Processors: Letting Applications Define Architectures. International Symposium on Microarchitecture, Micro-29, Paris, France, 1996, 324--335.]]"}],"event":{"sponsor":["ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"acronym":"CASES05","name":"CASES05: 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems","location":"San Francisco California USA"},"container-title":["Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1086297.1086337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1086297.1086337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:20Z","timestamp":1750262900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1086297.1086337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,24]]},"references-count":53,"alternative-id":["10.1145\/1086297.1086337","10.1145\/1086297"],"URL":"https:\/\/doi.org\/10.1145\/1086297.1086337","relation":{},"subject":[],"published":{"date-parts":[[2005,9,24]]},"assertion":[{"value":"2005-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}