{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:47:50Z","timestamp":1761648470597,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.23919\/date.2017.7927157","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T20:34:41Z","timestamp":1494880481000},"page":"1122-1127","source":"Crossref","is-referenced-by-count":11,"title":["Compromising FPGA SoCs using malicious hardware blocks"],"prefix":"10.23919","author":[{"given":"Nisha","family":"Jacob","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany"}]},{"given":"Carsten","family":"Rolfes","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany"}]},{"given":"Andreas","family":"Zankl","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany"}]},{"given":"Johann","family":"Heyszl","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany"}]}],"member":"263","reference":[{"journal-title":"Stratix 10 Secure Device Manager Provides Best-in-Class FPGA and SoC Security","year":"2015","key":"ref33"},{"journal-title":"System Memory Management Unit","year":"0","key":"ref32"},{"journal-title":"HTSHA-FAST64 Fast SHA-384\/512 Hashing","year":"2016","key":"ref31"},{"journal-title":"Understanding Cryptographic Performance","year":"2008","key":"ref30"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513114"},{"journal-title":"UltraScale Architecture Configuration User Guide","year":"2015","key":"ref11"},{"journal-title":"Zynq-7000 All Programmable SoC Technical Reference Manual","year":"0","key":"ref12"},{"journal-title":"Altera SoC Portfolio","year":"0","key":"ref13"},{"journal-title":"SmartFusion2 SoC FPGAs","year":"0","key":"ref14"},{"journal-title":"AMBA Specification","year":"0","key":"ref15"},{"journal-title":"CoreConnect","year":"0","key":"ref16"},{"journal-title":"SoC Interconnection Wishbone","year":"0","key":"ref17"},{"journal-title":"I\/O Memory Management Unit","year":"2011","key":"ref18"},{"key":"ref19","article-title":"TrustZone: Integrated Hardware and Software Security","author":"alves","year":"2004","journal-title":"ARM White paper"},{"journal-title":"Ensilica eSi - SHA-256","year":"2013","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"journal-title":"BA415-AES-GCM 10 to 100 Gbps IP Core","year":"2015","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"ref6","first-page":"382","article-title":"Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering","author":"lin","year":"2009","journal-title":"CHES"},{"journal-title":"BA413-SHA1 SHA2 and HMAC IP Core","year":"2016","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.21"},{"key":"ref8","first-page":"768","article-title":"Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive","volume":"2015","author":"swierczynski","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref7","article-title":"Designing and Implementing Malicious Hardware","author":"king","year":"2008","journal-title":"Networked Systems Design and Implementation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.369"},{"journal-title":"Security Monitor IP","year":"2015","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"journal-title":"UCONNECT Software Update","year":"0","key":"ref20"},{"key":"ref22","first-page":"118","article-title":"Playing &#x2018;Hide and Seek&#x2019; with Stored Keys","author":"shamir","year":"1999","journal-title":"Financial Cryptography Third International Conference FC'99 Anguilla British West Indies February 22&#x2013;25 1999 Proceedings"},{"journal-title":"All your private keys are belong to us &#x201C;Tobias Klein","year":"2006","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818030"},{"key":"ref23","first-page":"56","article-title":"JTAG Combined Attacks","author":"gonzalvo","year":"2015","journal-title":"TRUDEVICE 2015&#x2013; 4th Workshop on Secure Hardware and Security Evaluation"},{"journal-title":"mbed TLS","year":"0","key":"ref26"},{"journal-title":"linux-xlnx","year":"0","key":"ref25"}],"event":{"name":"2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2017,3,27]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2017,3,31]]}},"container-title":["Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2017"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7919927\/7926947\/07927157.pdf?arnumber=7927157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T08:08:26Z","timestamp":1623139706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7927157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":34,"URL":"https:\/\/doi.org\/10.23919\/date.2017.7927157","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}