{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T05:03:59Z","timestamp":1751000639486,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T00:00:00Z","timestamp":1590364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,25]]},"DOI":"10.1145\/3378678.3391886","type":"proceedings-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:21:35Z","timestamp":1590452495000},"page":"62-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["A secure hardware-software solution based on RISC-V, logic locking and microkernel"],"prefix":"10.1145","author":[{"given":"Dominik","family":"\u0160i\u0161ejkovi\u0107","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Farhad","family":"Merchant","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Lennart M.","family":"Reimann","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Rainer","family":"Leupers","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Massimiliano","family":"Giacometti","sequence":"additional","affiliation":[{"name":"Hensoldt Cyber GmbH, Germany"}]},{"given":"Sascha","family":"Kegrei\u00df","sequence":"additional","affiliation":[{"name":"Hensoldt Cyber GmbH, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ninth Annual Cost of Cybercrime Study. https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study (mar","author":"Accenture and Ponemon Institute","year":"2019","unstructured":"Accenture and Ponemon Institute . 2019. Ninth Annual Cost of Cybercrime Study. https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study (mar 2019 ). Accenture and Ponemon Institute. 2019. Ninth Annual Cost of Cybercrime Study. https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study (mar 2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060495"},{"key":"e_1_3_2_1_3_1","volume-title":"Tehranipoor","author":"Bhunia Swarup","year":"2017","unstructured":"Swarup Bhunia and Mark M . Tehranipoor . 2017 . The Hardware Trojan War: Attacks, Myths , and Defenses (1st ed.). Springer Publishing Company , Incorporated. Swarup Bhunia and Mark M. Tehranipoor. 2017. The Hardware Trojan War: Attacks, Myths, and Defenses (1st ed.). Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3265723.3265733"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2944586"},{"key":"e_1_3_2_1_6_1","volume-title":"Secure Mathematically-Assured Composition of Control Models. HACMS Final Report (sep","author":"Cofer Darren D.","year":"2017","unstructured":"Darren D. Cofer , John D. Backes , Andrew Gacek , Daniel daCosta , Michael W. Whalen , Ihor Kuz , Gerwin Klein , Gernot Heiser , Lee Pike , Adam Foltzer , Michal Podhradsk\u00fd , Douglas A. Stuart , Jason Grahan , and Brett Wilson . 2017. Secure Mathematically-Assured Composition of Control Models. HACMS Final Report (sep 2017 ). Darren D. Cofer, John D. Backes, Andrew Gacek, Daniel daCosta, Michael W. Whalen, Ihor Kuz, Gerwin Klein, Gernot Heiser, Lee Pike, Adam Foltzer, Michal Podhradsk\u00fd, Douglas A. Stuart, Jason Grahan, and Brett Wilson. 2017. Secure Mathematically-Assured Composition of Control Models. HACMS Final Report (sep 2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.41"},{"key":"e_1_3_2_1_8_1","volume-title":"How much would a data breach cost your business? https:\/\/www.ibm.com\/security\/data-breach (jan","author":"IBM.","year":"2020","unstructured":"IBM. 2020. How much would a data breach cost your business? https:\/\/www.ibm.com\/security\/data-breach (jan 2020 ). IBM. 2020. How much would a data breach cost your business? https:\/\/www.ibm.com\/security\/data-breach (jan 2020)."},{"key":"e_1_3_2_1_9_1","article-title":"TAAL: Tampering Attack on Any Key-based Logic Locked Circuits, In IEEE T VLSI SYST","author":"Jain Ayush","year":"2019","unstructured":"Ayush Jain , Ziqi Zhou , and Ujjwal Guin . 2019 . TAAL: Tampering Attack on Any Key-based Logic Locked Circuits, In IEEE T VLSI SYST . IEEE Transactions on Very Large Scale Integration (VLSI) Systems. Ayush Jain, Ziqi Zhou, and Ujjwal Guin. 2019. TAAL: Tampering Attack on Any Key-based Logic Locked Circuits, In IEEE T VLSI SYST. IEEE Transactions on Very Large Scale Integration (VLSI) Systems.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_11_1","unstructured":"Yunsup Lee and Henry Cook. 2012. RISC-V Torture Test Generator. https:\/\/github.com\/ucb-bar\/riscv-torture.  Yunsup Lee and Henry Cook. 2012. RISC-V Torture Test Generator. https:\/\/github.com\/ucb-bar\/riscv-torture."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224075"},{"key":"e_1_3_2_1_13_1","volume-title":"Global Cybercrime Damages Predicted To Reach $6 Trillion Annually By","author":"Magazine Cybercrime","year":"2021","unstructured":"Cybercrime Magazine . 2020. Global Cybercrime Damages Predicted To Reach $6 Trillion Annually By 2021 . https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/ (jan 2020). Cybercrime Magazine. 2020. Global Cybercrime Damages Predicted To Reach $6 Trillion Annually By 2021. https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/ (jan 2020)."},{"key":"e_1_3_2_1_14_1","volume-title":"DARPA to eliminate \"patch & pray\" by baking chips with cybersecurity fortification. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (apr","author":"Michael Cooney Network World","year":"2017","unstructured":"Network World Michael Cooney . 2017. DARPA to eliminate \"patch & pray\" by baking chips with cybersecurity fortification. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (apr 2017 ). Network World Michael Cooney. 2017. DARPA to eliminate \"patch & pray\" by baking chips with cybersecurity fortification. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (apr 2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"e_1_3_2_1_17_1","volume-title":"The Future of Cybersecurity Budgeting. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (may","author":"Varonis Sarah Hospelhorn","year":"2019","unstructured":"Sarah Hospelhorn Varonis . 2019. The Future of Cybersecurity Budgeting. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (may 2019 ). Sarah Hospelhorn Varonis. 2019. The Future of Cybersecurity Budgeting. https:\/\/www.varonis.com\/blog\/cybersecurity-budget\/ (may 2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229631.3229636"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299874.3317983"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926114"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2019.8791528"}],"event":{"name":"SCOPES '20: 23rd International Workshop on Software and Compilers for Embedded Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","EDAA European Design Automation Association"],"location":"St. Goar Germany","acronym":"SCOPES '20"},"container-title":["Proceedings of the 23th International Workshop on Software and Compilers for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378678.3391886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378678.3391886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:19Z","timestamp":1750200079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378678.3391886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,25]]},"references-count":21,"alternative-id":["10.1145\/3378678.3391886","10.1145\/3378678"],"URL":"https:\/\/doi.org\/10.1145\/3378678.3391886","relation":{},"subject":[],"published":{"date-parts":[[2020,5,25]]},"assertion":[{"value":"2020-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}