{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:38Z","timestamp":1750219778641,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz","award":["01MS20005A"],"award-info":[{"award-number":["01MS20005A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605168","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FISMOS \u2013 An FPGA Implementation of a Security Module as Open Source"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7046-7698","authenticated-orcid":false,"given":"Philipp","family":"Schubaur","sequence":"first","affiliation":[{"name":"HSA_innos, Augsburg Technical University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9849-876X","authenticated-orcid":false,"given":"Peter","family":"Knauer","sequence":"additional","affiliation":[{"name":"HSA_innos, Augsburg Technical University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2310-5895","authenticated-orcid":false,"given":"Dominik","family":"Merli","sequence":"additional","affiliation":[{"name":"HSA_innos, Augsburg Technical University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"volume-title":"AMBA AXI and ACE Protocol Specification. https:\/\/developer.arm.com\/documentation\/ihi0022\/h (Jan. 11","year":"2022","key":"e_1_3_2_1_1_1","unstructured":"Arm. 2020. AMBA AXI and ACE Protocol Specification. https:\/\/developer.arm.com\/documentation\/ihi0022\/h (Jan. 11, 2022)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.154"},{"key":"e_1_3_2_1_3_1","volume-title":"7th RISC-V Workshop Proceedings. https:\/\/riscv.org\/proceedings\/2017\/12\/7th-risc-v-workshop-proceedings","author":"Beal Mark","year":"2017","unstructured":"Mark Beal. 2017. Using RISC-V as a Security Processor for DARPA CHIPS and Commercial IoT. In 7th RISC-V Workshop Proceedings. https:\/\/riscv.org\/proceedings\/2017\/12\/7th-risc-v-workshop-proceedings"},{"volume-title":"picorv32. https:\/\/github.com\/cliffordwolf\/picorv32 (Apr. 27","year":"2020","key":"e_1_3_2_1_4_1","unstructured":"cliffordwolf. 2019. picorv32. https:\/\/github.com\/cliffordwolf\/picorv32 (Apr. 27, 2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2017.8279819"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2011.99"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362374.2362380"},{"key":"e_1_3_2_1_8_1","volume-title":"The GnuTLS Transport Layer Security Library. https:\/\/www.gnutls.org (July 21","author":"TLS.","year":"2022","unstructured":"GnuTLS. 2022. The GnuTLS Transport Layer Security Library. https:\/\/www.gnutls.org (July 21, 2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994796"},{"volume-title":"32-bit AURIX\u2122 TriCore\u2122 Microcontroller. https:\/\/www.infineon.com\/cms\/en\/product\/microcontroller\/32-bit-tricore-microcontroller (Nov. 8","year":"2021","key":"e_1_3_2_1_10_1","unstructured":"Infineon. 2021. 32-bit AURIX\u2122 TriCore\u2122 Microcontroller. https:\/\/www.infineon.com\/cms\/en\/product\/microcontroller\/32-bit-tricore-microcontroller (Nov. 8, 2021)."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/ironpeak.be\/blog\/crouching-t2-hidden-danger\/#security-issues (Apr. 14","author":"Peak Services GCV.","year":"2021","unstructured":"ironPeak Services GCV. 2020. Crouching T2, Hidden Danger. https:\/\/ironpeak.be\/blog\/crouching-t2-hidden-danger\/#security-issues (Apr. 14, 2021)."},{"volume-title":"Embedded systems security : practical methods for safe and secure software and systems development","author":"Kleidermacher David","key":"e_1_3_2_1_12_1","unstructured":"David Kleidermacher. 2012. Embedded systems security : practical methods for safe and secure software and systems development. Elsevier, Amsterdam."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161204"},{"key":"e_1_3_2_1_14_1","volume-title":"mbedtls. https:\/\/github.com\/Mbed-TLS\/mbedtls (July 21","author":"TLS.","year":"2022","unstructured":"Mbed-TLS. 2021. mbedtls. https:\/\/github.com\/Mbed-TLS\/mbedtls (July 21, 2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.microchip.com\/en-us\/product\/atecc508a (Nov. 7","author":"Microchip Technology Inc.","year":"2021","unstructured":"Microchip Technology Inc.2021. ATECC508A. https:\/\/www.microchip.com\/en-us\/product\/atecc508a (Nov. 7, 2021)."},{"key":"e_1_3_2_1_16_1","volume-title":"Best Practices for Sharing FPGA Designs. https:\/\/www.oshwa.org\/best-practices-for-sharing-fpga-designs (Jan. 3","author":"Open Source Hardware Association","year":"2021","unstructured":"Open Source Hardware Association. 2021. Best Practices for Sharing FPGA Designs. https:\/\/www.oshwa.org\/best-practices-for-sharing-fpga-designs (Jan. 3, 2021)."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.openssl.org (July 21","author":"SSL.","year":"2022","unstructured":"OpenSSL. 2022. OpenSSL. https:\/\/www.openssl.org (July 21, 2022)."},{"volume-title":"OpenTitan Hardware Dashboard. https:\/\/docs.opentitan.org\/hw (Mar. 22","year":"2021","key":"e_1_3_2_1_18_1","unstructured":"OpenTitan. 2021. OpenTitan Hardware Dashboard. https:\/\/docs.opentitan.org\/hw (Mar. 22, 2021)."},{"volume-title":"The RISC-V reader an open architecture atlas. Strawberry Canyon LLC","author":"Patterson David","key":"e_1_3_2_1_19_1","unstructured":"David Patterson. 2017. The RISC-V reader an open architecture atlas. Strawberry Canyon LLC, San Francisco, CA."},{"key":"e_1_3_2_1_20_1","volume-title":"Extracting Bitlocker Keys from a TPM. https:\/\/pulsesecurity.co.nz\/articles\/TPM-sniffing (Mar. 19","author":"Security Pulse","year":"2019","unstructured":"Pulse Security. 2019. Extracting Bitlocker Keys from a TPM. https:\/\/pulsesecurity.co.nz\/articles\/TPM-sniffing (Mar. 19, 2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/github.com\/hsainnos\/FISMOS (July 22","author":"FISMOS.","year":"2022","unstructured":"Schubaur. 2022. FISMOS. https:\/\/github.com\/hsainnos\/FISMOS (July 22, 2022)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.25929\/7mtt-nz04"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2019.0061"},{"volume-title":"mbed-tls. https:\/\/www.openhub.net\/p\/mbed-tls\/analyses\/latest\/languages_summary (July 21","year":"2022","key":"e_1_3_2_1_24_1","unstructured":"Synopsys. 2022. mbed-tls. https:\/\/www.openhub.net\/p\/mbed-tls\/analyses\/latest\/languages_summary (July 21, 2022)."},{"key":"e_1_3_2_1_25_1","volume-title":"https:\/\/www.libtom.net\/LibTomCrypt (July 21","author":"LibTomCrypt Team","year":"2022","unstructured":"Team libtom. 2022. LibTomCrypt. https:\/\/www.libtom.net\/LibTomCrypt (July 21, 2022)."},{"key":"e_1_3_2_1_26_1","volume-title":"Plug\u2019nPwn - Connect to Jailbreak. https:\/\/blog.t8012.dev\/plug-n-pwn (Nov. 4","author":"Development Blog The","year":"2021","unstructured":"The T2 Development Blog. 2020. Plug\u2019nPwn - Connect to Jailbreak. https:\/\/blog.t8012.dev\/plug-n-pwn (Nov. 4, 2021)."},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification (Apr. 12","author":"Trusted Computing Group Administration. 2019. TPM 2.0 Library.","year":"2022","unstructured":"Trusted Computing Group Administration. 2019. TPM 2.0 Library. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification (Apr. 12, 2022)."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/www.tulembedded.com\/FPGA\/ProductsPYNQ-Z2.html (July 21","author":"TUL.","year":"2022","unstructured":"TUL. 2022. PYNQ-Z2. https:\/\/www.tulembedded.com\/FPGA\/ProductsPYNQ-Z2.html (July 21, 2022)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-009-0371-2"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/github.com\/steveicarus\/iverilog (June 27","author":"Williams Stephen","year":"2022","unstructured":"Stephen Williams. 2022. Icarus Verilog. https:\/\/github.com\/steveicarus\/iverilog (June 27, 2022)."},{"key":"e_1_3_2_1_31_1","volume-title":"wolfSSL Embedded SSL\/TLS Library. https:\/\/www.wolfssl.com\/license (July 21","author":"SSL.","year":"2022","unstructured":"wolfSSL. 2022. wolfSSL Embedded SSL\/TLS Library. https:\/\/www.wolfssl.com\/license (July 21, 2022)."},{"volume-title":"Using Look-Up Tables as Distributed RAM in Spartan-3 Generation FPGAs. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp464.pdf (July 3","year":"2022","key":"e_1_3_2_1_32_1","unstructured":"Xilinx. 2005. Using Look-Up Tables as Distributed RAM in Spartan-3 Generation FPGAs. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp464.pdf (July 3, 2022)."},{"volume-title":"Zynq-7000 SoC First Generation Architecture. https:\/\/www.xilinx.com\/products\/silicon-devices\/soc\/zynq-7000.html (July 18","year":"2022","key":"e_1_3_2_1_33_1","unstructured":"Xilinx. 2018. Zynq-7000 SoC First Generation Architecture. https:\/\/www.xilinx.com\/products\/silicon-devices\/soc\/zynq-7000.html (July 18, 2022)."},{"volume-title":"Vivado Design Suite. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html (Mar. 22","year":"2021","key":"e_1_3_2_1_34_1","unstructured":"Xilinx. 2021. Vivado Design Suite. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html (Mar. 22, 2021)."},{"volume-title":"Accessing BRAM In Linux. https:\/\/xilinx-wiki.atlassian.net\/wiki\/spaces\/A\/pages\/18842412\/Accessing+BRAM+In+Linux (Jan. 17","year":"2022","key":"e_1_3_2_1_35_1","unstructured":"Xilinx. 2022. Accessing BRAM In Linux. https:\/\/xilinx-wiki.atlassian.net\/wiki\/spaces\/A\/pages\/18842412\/Accessing+BRAM+In+Linux (Jan. 17, 2022)."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","acronym":"ARES 2023","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605168","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:38Z","timestamp":1750178258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":35,"alternative-id":["10.1145\/3600160.3605168","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605168","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}