{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T15:40:49Z","timestamp":1762011649702,"version":"build-2065373602"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8714904","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"7-12","source":"Crossref","is-referenced-by-count":20,"title":["Multi-Tenant FPGA-based Reconfigurable Systems: Attacks and Defenses"],"prefix":"10.23919","author":[{"given":"Rana","family":"Elnaggar","sequence":"first","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]},{"given":"Krishnendu","family":"Chakrabarty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132709"},{"year":"0","key":"ref30","article-title":"Trivium-cipher implementation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056840"},{"key":"ref11","first-page":"383","article-title":"Return-oriented rootkits: bypassing kernel code integrity protection mechanisms","author":"hund","year":"2009","journal-title":"Proc Usenix Security Symposium"},{"year":"0","key":"ref12","article-title":"Using encryption and authentication to secure an ultrascale\/ultrascale+fpga bitstream"},{"year":"0","key":"ref13","article-title":"Vivado design suite user guide (partial reconfiguration)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2015.72"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2008.4629910"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954987"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2005.1568540"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.117"},{"year":"0","key":"ref28","article-title":"AES core implementation"},{"year":"0","key":"ref4","article-title":"Dynamic Hardware Patching"},{"year":"0","key":"ref27","article-title":"Siphash core implementation on the FPGA"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021740"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927507"},{"year":"0","key":"ref29","article-title":"Xtea implementation"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1225-0","author":"koch","year":"2013","journal-title":"Partial Reconfiguration on FPGAs Architectures Tools and Applications"},{"key":"ref8","article-title":"ATRA: address translation redirection attack against hardware-based external monitors","author":"ang","year":"2014","journal-title":"Proc ACM CCS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISTMWC.2007.4299250"},{"year":"0","key":"ref2","article-title":"Amazon EC2 F1 Instance"},{"key":"ref9","first-page":"601","article-title":"Stealing machine learning models via prediction APIs","author":"tram\u00e8r","year":"2016","journal-title":"Proc Usenix Security Symposium"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2678373.2665678","article-title":"A reconfigurable fabric for accelerating large-scale datacenter services","volume":"42","author":"putnam","year":"2014","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref20","first-page":"1","article-title":"Keying hash functions for message authentication","author":"bellare","year":"1996","journal-title":"Proc CRYPTO Springer"},{"journal-title":"Foundations of Cryptography Volume 2 Basic Applications","year":"2009","author":"goldreich","key":"ref22"},{"article-title":"The keyed-hash message authentication code (hmac)","year":"2008","author":"turner","key":"ref21"},{"key":"ref24","first-page":"90","article-title":"Detection of multiple, partially occluded humans in a single image by bayesian combination of edgelet part detectors","volume":"1","author":"wu","year":"2005","journal-title":"Proc IEEE ICCV"},{"year":"0","key":"ref23","article-title":"Partial reconfiguration demo"},{"year":"0","key":"ref26","article-title":"Demo files"},{"key":"ref25","first-page":"489","article-title":"SipHash: a fast short-input PRF","author":"aumasson","year":"2012","journal-title":"Proc Springer Int Conf on Cryptology in India"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08714904.pdf?arnumber=8714904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:48:20Z","timestamp":1643244500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8714904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8714904","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}