{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:21:05Z","timestamp":1725672065741},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/sasow.2012.11","type":"proceedings-article","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T16:14:26Z","timestamp":1366042466000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Hardware Support for Safety Interlocks and Introspection"],"prefix":"10.1109","author":[{"given":"Udit","family":"Dhawan","sequence":"first","affiliation":[]},{"given":"Albert","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Edin","family":"Kadric","sequence":"additional","affiliation":[]},{"given":"Catalin","family":"Hritcu","sequence":"additional","affiliation":[]},{"given":"Benjamin C.","family":"Pierce","sequence":"additional","affiliation":[]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Andre","family":"DeHon","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Malecha","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Morrisett","sequence":"additional","affiliation":[]},{"given":"Thomas F.","family":"Knight","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Sutherland","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Hawkins","sequence":"additional","affiliation":[]},{"given":"Amanda","family":"Zyxnfryx","sequence":"additional","affiliation":[]},{"given":"David","family":"Wittenberg","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Trei","sequence":"additional","affiliation":[]},{"given":"Sumit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Sullivan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/106972.106985"},{"key":"17","article-title":"Abstractions for usable information flow control in Aeolus","author":"cheng","year":"0","journal-title":"Proceedings of the 2012 USENIX Annual Technical Conference Jun 2012"},{"journal-title":"Why Aren't Operating Systems Getting Faster As Fast As Hardware","year":"1989","author":"ousterhout","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/319301.319345"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"journal-title":"A Capability Representation with Embedded Address and Nearly-exact Object Bounds","year":"2000","author":"brown","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"20","first-page":"304","article-title":"Mondrian memory protection","author":"witchel","year":"0","journal-title":"Procs of the 10th Intl Conf on Architectural Support for Programming Languages and Operating Systems 2002"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1187976.1187977"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"25","first-page":"56","article-title":"Implicit flows: Can't live with 'em, can't live without 'em","author":"king","year":"2008","journal-title":"ICISS"},{"key":"26","first-page":"27","article-title":"The reference monitor concept as a unifying principle in computer security education","author":"irvine","year":"0","journal-title":"Proceedings of the IFIP TC11 WG 11 8 First World Conference on Information Security Education 1999"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352624"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2039239.2039245"},{"journal-title":"Computer Architecture A Quantitative Approach","year":"2003","author":"hennessy","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"journal-title":"\"Bluespec SystemVerilog \" [Online]","year":"0","key":"30"},{"key":"7","article-title":"The LISP machine","author":"greenblatt","year":"1984","journal-title":"Interactive Programming Environments"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.37"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"journal-title":"\"Virtex-6 FPGA ML605 Evaluation Kit \" [Online]","year":"0","key":"31"},{"journal-title":"Trust-management Intrusion-tolerance Accountability and Reconstitution Architecture (Tiara)","year":"2009","author":"shrobe","key":"4"},{"key":"9","article-title":"Intel virtualization technology: Hardware support for efficient processor virtualization","author":"leung","year":"2006","journal-title":"Intel Technology Journal"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/45059.214411"}],"event":{"name":"2012 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW)","start":{"date-parts":[[2012,9,10]]},"location":"Lyon, France","end":{"date-parts":[[2012,9,14]]}},"container-title":["2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6497699\/6498360\/06498372.pdf?arnumber=6498372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T13:55:55Z","timestamp":1490190955000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6498372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/sasow.2012.11","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}