{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:30:24Z","timestamp":1767832224897,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["Task 2686.001"],"award-info":[{"award-number":["Task 2686.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618275"],"award-info":[{"award-number":["CNS-1618275"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-18-C-0014"],"award-info":[{"award-number":["HR0011-18-C-0014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3243415","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["High-level synthesis with timing-sensitive information flow enforcement"],"prefix":"10.1145","author":[{"given":"Zhenghong","family":"Jiang","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Steve","family":"Dai","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Zhiru","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325702"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3130379.3130775"},{"key":"e_1_3_2_1_3_1","volume-title":"Modulo SDC Scheduling with Recurrence Minimization in High-Level Synthesis. Int'l Conf. on Field Programmable Logic and Applications (FPL)","author":"Canis Andrew","year":"2014","unstructured":"Andrew Canis, Stephen D. Brown, and Jason H. Anderson. Modulo SDC Scheduling with Recurrence Minimization in High-Level Synthesis. Int'l Conf. on Field Programmable Logic and Applications (FPL), 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950413.1950423"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2110592"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1147025"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174243.3174268"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021754"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_10_1","volume-title":"CUDA Leaks: Information Leakage in GPU Architectures. arXiv preprint arXiv:1305.7383","author":"Pietro Roberto Di","year":"2013","unstructured":"Roberto Di Pietro, Flavio Lombardi, and Antonio Villani. CUDA Leaks: Information Leakage in GPU Architectures. arXiv preprint arXiv:1305.7383, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062316"},{"key":"e_1_3_2_1_12_1","volume-title":"Goguen and Jos\u00e9 Meseguer. Security Policies and Security Models. IEEE Symp. on Security and Privacy (SP)","author":"Joseph","year":"1982","unstructured":"Joseph A. Goguen and Jos\u00e9 Meseguer. Security Policies and Security Models. IEEE Symp. on Security and Privacy (SP), 1982."},{"key":"e_1_3_2_1_13_1","volume-title":"CHStone: A Benchmark Program Suite for Practical C-Based High-Level Synthesis. Int'l Symp. on Circuits and Systems (ISCAS)","author":"Hara Yuko","year":"2008","unstructured":"Yuko Hara, Hiroyuki Tomiyama, Shinya Honda, Hiroaki Takada, and Katsuya Ishii. CHStone: A Benchmark Program Suite for Practical C-Based High-Level Synthesis. Int'l Symp. on Circuits and Systems (ISCAS), 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"ARM Security Technology Building a Secure System using a TrustZone Technology","author":"Holdings ARM","year":"2009","unstructured":"ARM Holdings. ARM Security Technology Building a Secure System using a TrustZone Technology, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174243.3174264"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898034"},{"key":"e_1_3_2_1_18_1","volume-title":"Architectures and Processors (ASAP)","author":"Choden Konigsmark S.T.","year":"2017","unstructured":"S.T. Choden Konigsmark, Deming Chen, and Martin D.F. Wong. High-Level Synthesis for Side-Channel Defense. Int'l Conf. on Application-Specific Systems, Architectures and Processors (ASAP), 2017."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_20_1","volume-title":"Timing Attack in Google Keyczar Library","author":"Lawson Nate","year":"2009","unstructured":"Nate Lawson. Timing Attack in Google Keyczar Library, 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Xun Li Vineeth Kashyap Jason K. Oberg Mohit Tiwari Vasanth Ram Rajarathinam Ryan Kastner Timothy Sherwood Ben Hardekopf and Frederic T. Chong. Sapper: A Language for Hardware-Level Security Policy Enforcement. Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2014. 10.1145\/2541940.2541947","DOI":"10.1145\/2541940.2541947"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/649057"},{"key":"e_1_3_2_1_25_1","author":"Liu Gai","year":"2017","unstructured":"Gai Liu, Mingxing Tan, Steve Dai, Ritchie Zhao, and Zhiru Zhang. Architecture and Synthesis for Area-Efficient Pipelining of Irregular Loop Nests. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2017.","journal-title":"Trans. on Computer-Aided Design of Integrated Circuits and Systems (TCAD)"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.31"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_23"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830819"},{"key":"e_1_3_2_1_29_1","volume-title":"Conf. on Computer Design (ICCD)","author":"Peter Steffen","year":"2016","unstructured":"Steffen Peter and Tony Givargis. Towards A Timing Attack Aware High-Level Synthesis of Integrated Circuits. Int'l Conf. on Computer Design (ICCD), 2016."},{"key":"e_1_3_2_1_30_1","volume-title":"High-Level Synthesis for Security and Trust. Int'l On-Line Testing Symposium (IOLTS)","author":"Rajendran Jeyavijayan","year":"2013","unstructured":"Jeyavijayan Rajendran, Huan Zhang, Ozgur Sinanoglu, and Ramesh Karri. High-Level Synthesis for Security and Trust. Int'l On-Line Testing Symposium (IOLTS), 2013."},{"key":"e_1_3_2_1_31_1","author":"Rajendran Jeyavijayan JV.","year":"2016","unstructured":"Jeyavijayan JV. Rajendran, Ozgur Sinanoglu, and Ramesh Karri. Building Trustworthy Systems using Untrusted Components: A High-Level Synthesis Approach. IEEE Trans. on Very Large-Scale Integration Systems (TVLSI), 2016.","journal-title":"Trans. on Very Large-Scale Integration Systems (TVLSI)"},{"key":"e_1_3_2_1_32_1","volume-title":"Gu-Yeon Wei, and David Brooks. Machsuite: Benchmarks for Accelerator Design and Customized Architectures. Int'l Symp. on Workload Characterization (IISWC)","author":"Reagen Brandon","year":"2014","unstructured":"Brandon Reagen, Robert Adolf, Yakun Sophia Shao, Gu-Yeon Wei, and David Brooks. Machsuite: Benchmarks for Accelerator Design and Customized Architectures. Int'l Symp. on Workload Characterization (IISWC), 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_19"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752399"},{"key":"e_1_3_2_1_36_1","volume-title":"Yunheung Paek. HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symp. on Security and Privacy (SP)","author":"Song Chengyu","year":"2016","unstructured":"Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, and Yunheung Paek. HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symp. on Security and Privacy (SP), 2016."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjtsldm.8.12"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2561828.2561872"}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","location":"San Diego California","acronym":"ICCAD '18","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"]},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3243415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3243415","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3243415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:43Z","timestamp":1750207423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3243415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":41,"alternative-id":["10.1145\/3240765.3243415","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3243415","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}