{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:04Z","timestamp":1750221244671,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,15]],"date-time":"2018-07-15T00:00:00Z","timestamp":1531612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["01IS160253"],"award-info":[{"award-number":["01IS160253"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,15]]},"DOI":"10.1145\/3229631.3239367","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"162-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding MPSoCs"],"prefix":"10.1145","author":[{"given":"Johanna","family":"Sepulveda","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Cezar","family":"Reinbrecht","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Siavoosh Payandeh","family":"Azad","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Behrad","family":"Niazmand","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Gert","family":"Jervan","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2018,7,15]]},"reference":[{"unstructured":"2015. Project Bonfire Network-on-Chip. https:\/\/github.com\/Project-Bonfire. (2015).  2015. Project Bonfire Network-on-Chip. https:\/\/github.com\/Project-Bonfire. (2015).","key":"e_1_3_2_1_1_1"},{"unstructured":"Daniel J. Bernstein. 2005. Cache Timing Attacks on AES. Available at: https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf. (April 2005).  Daniel J. Bernstein. 2005. Cache Timing Attacks on AES. Available at: https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf. (April 2005).","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-642-11925-5_17"},{"volume-title":"Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses. In In Proc. of Virus Bulletin Conf.","year":"2002","author":"Chien Eric","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"crossref","unstructured":"Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael. Springer-Verlag Berlin Heidelberg.   Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael. Springer-Verlag Berlin Heidelberg.","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-662-04722-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/L-CA.2007.16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3123939.3124546"},{"volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P' 19)","year":"2019","author":"Kocher Paul","key":"e_1_3_2_1_8_1"},{"volume-title":"27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"Lipp Moritz","key":"e_1_3_2_1_9_1"},{"volume-title":"Automation Test in Europe Conference Exhibition (DATE). 648--653","author":"Reinbrecht C.","key":"e_1_3_2_1_10_1"},{"volume-title":"2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 601--606","author":"Reinbrecht C.","key":"e_1_3_2_1_11_1"},{"volume-title":"2016 29th Symposium on Integrated Circuits and Systems Design (SBCCI). 1--6.","author":"Reinbrecht C.","key":"e_1_3_2_1_12_1"},{"volume-title":"2016 IEEE 7th Latin American Symposium on Circuits Systems (LASCAS). 91--94","author":"Sep\u00falveda J.","key":"e_1_3_2_1_13_1"},{"volume-title":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 284--289","author":"Sep\u00falveda J.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/LES.2014.2384744"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/s11227-014-1348-x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/NOCS.2012.24"}],"event":{"acronym":"SAMOS XVIII","name":"SAMOS XVIII: Architectures, Modeling, and Simulation","location":"Pythagorion Greece"},"container-title":["Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229631.3239367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229631.3239367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:38Z","timestamp":1750212458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229631.3239367"}},"subtitle":["exploiting memory microarchitectural vulnerabilities of high performance NoC-based MPSoCs"],"short-title":[],"issued":{"date-parts":[[2018,7,15]]},"references-count":17,"alternative-id":["10.1145\/3229631.3239367","10.1145\/3229631"],"URL":"https:\/\/doi.org\/10.1145\/3229631.3239367","relation":{},"subject":[],"published":{"date-parts":[[2018,7,15]]},"assertion":[{"value":"2018-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}