{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T17:42:43Z","timestamp":1751996563874,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818030","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"461-470","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics"],"prefix":"10.1145","author":[{"given":"Letitia W.","family":"Li","sequence":"first","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com \/ T\u00e9l\u00e9com ParisTech \/ CNRS LTCI"}]},{"given":"Guillaume","family":"Duc","sequence":"additional","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com \/ T\u00e9l\u00e9com ParisTech \/ CNRS LTCI"}]},{"given":"Renaud","family":"Pacalet","sequence":"additional","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com \/ T\u00e9l\u00e9com ParisTech \/ CNRS LTCI"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Altera socs: When architecture matters: https:\/\/www.altera.com\/products\/soc\/overview.html.  Altera socs: When architecture matters: https:\/\/www.altera.com\/products\/soc\/overview.html."},{"key":"e_1_3_2_1_2_1","unstructured":"AXI reference guide: http:\/\/www.xilinx.com\/support\/documentation\/ip_documentation\/ug761_axi_reference_guide.pdf.  AXI reference guide: http:\/\/www.xilinx.com\/support\/documentation\/ip_documentation\/ug761_axi_reference_guide.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"BusyBox: http:\/\/www.busybox.net.  BusyBox: http:\/\/www.busybox.net."},{"key":"e_1_3_2_1_4_1","unstructured":"RAMspeed: http:\/\/alasir.com\/software\/ramspeed.  RAMspeed: http:\/\/alasir.com\/software\/ramspeed."},{"key":"e_1_3_2_1_5_1","unstructured":"Secbus a hardware \/ software architecture protecting the external memories of an soc: https:\/\/secbus.telecom-paristech.fr\/.  Secbus a hardware \/ software architecture protecting the external memories of an soc: https:\/\/secbus.telecom-paristech.fr\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Vivado design suite: http:\/\/www.xilinx.com\/products\/design-tools\/vivado.html.  Vivado design suite: http:\/\/www.xilinx.com\/products\/design-tools\/vivado.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Xilinx all programmable socs: http:\/\/www.xilinx.com\/products\/silicon-devices\/soc.html.  Xilinx all programmable socs: http:\/\/www.xilinx.com\/products\/silicon-devices\/soc.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Zedboard community-based web site: http:\/\/zedboard.org\/.  Zedboard community-based web site: http:\/\/zedboard.org\/."},{"key":"e_1_3_2_1_9_1","volume-title":"DTIC Document","author":"Christodorescu M.","year":"2006","unstructured":"M. Christodorescu and S. Jha . Static analysis of executables to detect malicious patterns. Technical report , DTIC Document , 2006 . M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. Technical report, DTIC Document, 2006."},{"volume-title":"The Zynq Book","author":"Crockett L. H.","key":"e_1_3_2_1_10_1","unstructured":"L. H. Crockett , R. A. Elliot , M. A. Enderwitz , and R. W. Stewart . The Zynq Book . Strathclyde Academic Media , Department of Electronic and Electrical Engineering University of Strathclyde Glasgow, Scotland, UK, 1 edition, 7 2014. L. H. Crockett, R. A. Elliot, M. A. Enderwitz, and R. W. Stewart. The Zynq Book. Strathclyde Academic Media, Department of Electronic and Electrical Engineering University of Strathclyde Glasgow, Scotland, UK, 1 edition, 7 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_8"},{"key":"e_1_3_2_1_13_1","first-page":"213","volume-title":"CHES '02","author":"Huang A.","year":"2003","unstructured":"A. Huang . Keeping secrets in hardware: The microsoft xbox\u2122 ; case study. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems , CHES '02 , pages 213 -- 227 , London, UK, UK , 2003 . Springer-Verlag. A. Huang. Keeping secrets in hardware: The microsoft xbox\u2122 ; case study. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES '02, pages 213--227, London, UK, UK, 2003. Springer-Verlag."},{"key":"e_1_3_2_1_14_1","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Laing S.","year":"2014","unstructured":"S. Laing , M. E. Locasto , and J. Aycock . An experience report on extracting and viewing memory events via wireshark . In 8th USENIX Workshop on Offensive Technologies (WOOT 14) , San Diego, CA , 2014 . USENIX Association. S. Laing, M. E. Locasto, and J. Aycock. An experience report on extracting and viewing memory events via wireshark. In 8th USENIX Workshop on Offensive Technologies (WOOT 14), San Diego, CA, 2014. USENIX Association."},{"key":"e_1_3_2_1_15_1","volume-title":"Real-time FPGA-based Capture of Memory Traces with Application to Active Memory Emulation","author":"Lloyd G. S.","year":"2014","unstructured":"G. S. Lloyd , K. Y. Cheng , and M. B. Gokhale . Real-time FPGA-based Capture of Memory Traces with Application to Active Memory Emulation . Aug 2014 . G. S. Lloyd, K. Y. Cheng, and M. B. Gokhale. Real-time FPGA-based Capture of Memory Traces with Application to Active Memory Emulation. Aug 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_17_1","first-page":"115","volume-title":"Presented as part of the 2013 USENIX Annual Technical Conference (USENIX ATC 13)","author":"Payer M.","year":"2013","unstructured":"M. Payer , E. Kravina , and T. R. Gross . Lightweight memory tracing . In Presented as part of the 2013 USENIX Annual Technical Conference (USENIX ATC 13) , pages 115 -- 126 , San Jose, CA , 2013 . USENIX. M. Payer, E. Kravina, and T. R. Gross. Lightweight memory tracing. In Presented as part of the 2013 USENIX Annual Technical Conference (USENIX ATC 13), pages 115--126, San Jose, CA, 2013. USENIX."},{"key":"e_1_3_2_1_18_1","first-page":"179","volume-title":"In Proceedings of the 13th USENIX Security Symposium","author":"Petroni N. L.","year":"2004","unstructured":"N. L. Petroni , J. Timothy , F. Jesus , M. William , and A. Arbaugh . Copilot - a coprocessor-based kernel runtime integrity monitor . In In Proceedings of the 13th USENIX Security Symposium , pages 179 -- 194 , 2004 . N. L. Petroni, J. Timothy, F. Jesus, M. William, and A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In In Proceedings of the 13th USENIX Security Symposium, pages 179--194, 2004."},{"key":"e_1_3_2_1_19_1","unstructured":"TRustworthy Embedded Systems for Secure Cloud Computing Applications. Secure cloud computing applications secure cloud computing applications (trescca). http:\/\/www.trescca.eu\/.  TRustworthy Embedded Systems for Secure Cloud Computing Applications. Secure cloud computing applications secure cloud computing applications (trescca). http:\/\/www.trescca.eu\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/358274.358283"},{"key":"e_1_3_2_1_21_1","volume-title":"Automatic Malware Analysis: An Emulator Based Approach","author":"Yin H.","year":"2012","unstructured":"H. Yin and D. Song . Automatic Malware Analysis: An Emulator Based Approach . Springer Publishing Company, Inc orporated, 2012 . H. Yin and D. Song. Automatic Malware Analysis: An Emulator Based Approach. Springer Publishing Company, Incorporated, 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818030","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":22,"alternative-id":["10.1145\/2818000.2818030","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818030","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}