{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:47:52Z","timestamp":1726001272941},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030032500"},{"type":"electronic","value":"9783030032517"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03251-7_23","type":"book-chapter","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T07:12:07Z","timestamp":1542957127000},"page":"192-202","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Requirements for Root of Trust Establishment"],"prefix":"10.1007","author":[{"given":"Virgil","family":"Gligor","sequence":"first","affiliation":[]},{"given":"Maverick","family":"Woo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"key":"23_CR1","series-title":"Springer Briefs in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1460-5","volume-title":"Bootstrapping Trust in Modern Computers","author":"B Parno","year":"2011","unstructured":"Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers. Springer Briefs in Computer Science, vol. 10. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-1460-5"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13869-0_2","volume-title":"Trust and Trustworthy Computing","author":"Y Li","year":"2010","unstructured":"Li, Y., McCune, J.M., Perrig, A.: SBAP: software-based attestation for peripherals. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 16\u201329. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13869-0_2"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Li, Y., McCune, J.M., Perrig, A.: VIPER: verifying the integrity of PERipherals\u2019 firmware. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 3\u201316. ACM Press (2011)","DOI":"10.1145\/2046707.2046711"},{"key":"23_CR4","unstructured":"Cui, A., Costello, M., Stolfo, S.: When firmware modifications attack: a case study of embedded exploitation. In: Proceedings of the 2013 Network and Distributed Systems Security Symposium, ISOC (2013)"},{"key":"23_CR5","series-title":"T-Lab Series in Telecommunication Services","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13515-1","volume-title":"Detecting Peripheral-based Attacks on the Host Memory","author":"P Stewin","year":"2014","unstructured":"Stewin, P.: Detecting Peripheral-based Attacks on the Host Memory. T-Lab Series in Telecommunication Services. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-319-13515-1"},{"key":"23_CR6","unstructured":"Delugre, G.: Closer to metal: reverse engineering the broadcom NetExtreme\u2019s firmware. In: Sogeti ESEC Lab. (2010)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-23644-0_20","volume-title":"Recent Advances in Intrusion Detection","author":"L Duflot","year":"2011","unstructured":"Duflot, L., Perez, Y.-A., Morin, B.: What if you can\u2019t trust your network card? In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 378\u2013397. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_20"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Zaddach, J., et al.: Implementation and implications of a stealth hard-drive backdoor. In: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC). ACM (2013)","DOI":"10.1145\/2523649.2523661"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Mearian, L.: There\u2019s no way of knowing if the NSA\u2019s spyware is on your hard drive. Computerworld 2 (2015)","DOI":"10.1016\/S1353-4858(15)30012-X"},{"key":"23_CR10","unstructured":"Raiu, C.: Equation: The Death Star of the Malware Galaxy, February 2015"},{"key":"23_CR11","unstructured":"Applebaum, J., Horchert, J., Stocker, C.: Catalog reveals NSA has back doors for numerous devices, vol. 29 (2013)"},{"key":"23_CR12","unstructured":"Greenberg, A.: Why the security of USB is fundamentally broken. In: Wired Magazine, Number July (2014)"},{"key":"23_CR13","unstructured":"Parno, B.: Bootstrapping trust in a trusted platform. In: Proceedings of the 3rd Conference on Hot Topics in security, pp. 1\u20136. USENIX Association (2008)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Lone-Sang, F., Nicomette, V., Deswarte, Y.: I\/O attacks in intel-pc architectures and countermeasures. In: Proceedings of the Symposium for the Security of Information and Communication Technologies SSTIC (2011)","DOI":"10.1109\/SysSec.2011.10"},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MSP.2013.79","volume":"12","author":"Fernand Lone Sang","year":"2014","unstructured":"Lone-Sang, F., Nicomette, V., Deswarte, Y.: A tool to analyze potential I\/O attacks against PCs. In: IEEE Security and Privacy, pp. 60\u201366 (2014)","journal-title":"IEEE Security & Privacy"},{"key":"23_CR16","unstructured":"Kaspersky Lab: The Duqu 2.0 - Technical Details (version 2.1). Technical report (2015)"},{"key":"23_CR17","unstructured":"Eldefrawy, K., Perito, D., Tsudik, G.: SMART: Secure and minimal architecture for (establishing a dynamic) root of trust, February 2012"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Schulz, S., Sadeghi, A.-R., Varadharajan, V.: TrustLite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems, EuroSys 2014 (2014)","DOI":"10.1145\/2592798.2592824"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Asokan, N., et al.: SEDA: scalable embedded device attestation. In: Proceedings of the 2015 ACM Conference on Computer and Communications Security. ACM (2015)","DOI":"10.1145\/2810103.2813670"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A.R., Tsudik, G., Zeitouni, S.: DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. WiSec 2016, pp. 171\u2013182. ACM (2016)","DOI":"10.1145\/2939918.2939938"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A.R., Zeitouni, S.: SeED: secure non-interactive attestation for embedded devices. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec 2017, pp. 64\u201374 (2017)","DOI":"10.1145\/3098243.3098260"},{"key":"23_CR22","unstructured":"Lipton, R., Ostrovsky, R., Zikas, b.: Provable virus detection: using the uncertainty principle to protect against malware. Cryptology ePrint Archive, Report 2015\/728 (2015). http:\/\/eprint.iacr.org\/2015\/728"},{"key":"23_CR23","unstructured":"Lipton, R., Ostrovsky, R., Zikas, V.: Provably secure virus detection: using the observer effect against malware. In: 43rd International Colloquium on Automata, Languages, and Programming, ICALP 2016, 11\u201315 July 2016, Rome, Italy, pp. 32:1\u201332:14 (2016)"},{"key":"23_CR24","unstructured":"Thorup, M.: High speed hashing for integers and strings. CoRR arXiv:1504.06804 , September 2015"},{"issue":"1","key":"23_CR25","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/353323.353383","volume":"3","author":"D Spinellis","year":"2000","unstructured":"Spinellis, D.: Reflection as a mechanism for software integrity verification. ACM Trans. Inf. Syst. Secur. 3(1), 51\u201362 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles, pp. 1\u201316. ACM (2005)","DOI":"10.1145\/1095810.1095812"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, pp. 85\u201394. ACM (2006)","DOI":"10.1145\/1161289.1161306"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of 21st ACM Symposium on Operating Systems Principles, pp. 335\u2013350. ACM (2007)","DOI":"10.1145\/1294261.1294294"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 239\u2013253. IEEE (2012)","DOI":"10.1109\/SP.2012.45"},{"key":"23_CR30","unstructured":"Jakobsson, M., Johansson, K.A.: Retroactive detection of malware with applications to mobile platforms. In: Proceedings of the 5th USENIX Workshop on Hot Topics in Security, USENIX (2010)"},{"key":"23_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-319-26096-9_7","volume-title":"Security Protocols XXIII","author":"Y Li","year":"2015","unstructured":"Li, Y., Cheng, Y., Gligor, V., Perrig, A.: Establishing software-only root of trust on embedded systems: facts and fiction. In: Christianson, B., \u0160venda, P., Maty\u00e1\u0161, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2015. LNCS, vol. 9379, pp. 50\u201368. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26096-9_7"},{"issue":"1","key":"23_CR32","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1006\/jcom.1999.0526","volume":"16","author":"M Aldaz","year":"2000","unstructured":"Aldaz, M., Heintz, J., Matera, G., Montaa, J., Pardo, L.: Time-space tradeoffs in algebraic complexity theory. J. Complex. 16(1), 2\u201349 (2000)","journal-title":"J. Complex."},{"key":"23_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/3-540-61440-0_149","volume-title":"Automata, Languages and Programming","author":"PB Miltersen","year":"1996","unstructured":"Miltersen, P.B.: Lower bounds for static dictionaries on RAMs with bit operations but no multiplication. In: Meyer, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 442\u2013453. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61440-0_149"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Andersson, A., Miltersen, P.B., Riis, S., Thorup, M.: Static dictionaries on $$AC^0$$ RAMs: query time $${\\varTheta } (\\sqrt{(}log~n\/log~log~n))$$ is necessary and sufficient. In: Proceedings of 37th FOCS, pp. 441\u2013450 (1996)","DOI":"10.7146\/brics.v4i14.21678"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 272\u2013282. IEEE (2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 400\u2013409. ACM (2009)","DOI":"10.1145\/1653662.1653711"},{"key":"23_CR37","unstructured":"Perrig, A., van Doorn, L.: Refutation of \u201con the difficulty of software-based attestation of embedded devices\u201d (2010)"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A.R., Schulz, S., Wachsmann, C.: A security framework for the analysis and design of software attestation. In: Proceedings of the 2013 ACM Conference on Computer and Communications Security, pp. 1\u201312. ACM (2013)","DOI":"10.1145\/2508859.2516650"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Francillon, A., Nguyen, Q., Rasmussen, K.B., Tsudik, G.: A minimalist approach to remote attestation. In: Proceedings of the Conference on Design, Automation & Test in Europe. DATE 2014, 3001 Leuven, Belgium, Belgium, pp. 244:1\u2013244:6. European Design and Automation Association (2014)","DOI":"10.7873\/DATE2014.257"},{"issue":"3","key":"23_CR40","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1145\/322261.322274","volume":"28","author":"AC-C Yao","year":"1981","unstructured":"Yao, A.C.-C.: Should tables be sorted? J. ACM 28(3), 615\u2013628 (1981)","journal-title":"J. ACM"},{"key":"23_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-41717-7_12","volume-title":"Security Protocols XXI","author":"J Zhao","year":"2013","unstructured":"Zhao, J., Gligor, V., Perrig, A., Newsome, J.: ReDABLS: revisiting device attestation with bounded leakage of secrets. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 94\u2013114. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41717-7_12"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXVI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03251-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T23:07:17Z","timestamp":1572995237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03251-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030032500","9783030032517"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03251-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"Security Protocols","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge International Workshop on Security Protocols","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spw2018.crocs.fi.muni.cz","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"the workshop is invitation only","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"email","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"N\/A% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"the workshop is invitation only","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}