{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:47:45Z","timestamp":1774687665113,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116363","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1121-1126","source":"Crossref","is-referenced-by-count":9,"title":["DEFCON: Generating and Detecting Failure-prone Instruction Sequences via Stochastic Search"],"prefix":"10.23919","author":[{"given":"Ioannis","family":"Tsiokanos","sequence":"first","affiliation":[{"name":"Queen&#x2019;s University,Institute of Electronics, Communications and Information Technology,Belfast,UK"}]},{"given":"Lev","family":"Mukhanov","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University,Institute of Electronics, Communications and Information Technology,Belfast,UK"}]},{"given":"Giorgis","family":"Georgakoudis","sequence":"additional","affiliation":[{"name":"Lawrence Livermore National Laboratory,Center for Applied Scientific Computing,USA"}]},{"given":"Dimitrios S.","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Georgios","family":"Karakonstantis","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University,Institute of Electronics, Communications and Information Technology,Belfast,UK"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744805"},{"key":"ref11","first-page":"1","article-title":"Compiler-guided instruction-level clock scheduling for timing speculative processors","author":"fan","year":"2018","journal-title":"DAC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317758"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2766221"},{"key":"ref15","article-title":"IEEE 754-2008 Standard for Floating-Point Arithmetic","year":"0"},{"key":"ref16","author":"bhasker","year":"2009","journal-title":"Static Timing Analysis for Nanometer Designs A Practical Approach"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"ref18","article-title":"OpenRISC 1000 architecture manual","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2019.2898949"},{"key":"ref3","first-page":"2295","article-title":"Hardware designer&#x2019;s guide to fault attacks","volume":"21","author":"karaklaji","year":"2013","journal-title":"IEEE TVLSI"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080225"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2783333"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950405"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2223467"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2749423"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240809"},{"key":"ref20","first-page":"158","article-title":"The nas parallel benchmarks&#x2014; summary and preliminary results","author":"bailey","year":"1991","journal-title":"Supercomputing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0303"},{"key":"ref21","article-title":"Efficient, transparent, and comprehensive runtime code manipulation","author":"bruening","year":"2004","journal-title":"Ph D Dissertation"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Grenoble, France","start":{"date-parts":[[2020,3,9]]},"end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116363.pdf?arnumber=9116363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:48:01Z","timestamp":1659484081000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116363","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}