{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:05:52Z","timestamp":1766268352417,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031556722"},{"type":"electronic","value":"9783031556739"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-55673-9_17","type":"book-chapter","created":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T23:02:15Z","timestamp":1710198135000},"page":"241-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trusted Computing Architectures for\u00a0IoT Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9965-915X","authenticated-orcid":false,"given":"An","family":"Braeken","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4877-9688","authenticated-orcid":false,"given":"Bruno","family":"da Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-0026","authenticated-orcid":false,"given":"Laurent","family":"Segers","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7298-8252","authenticated-orcid":false,"given":"Johannes","family":"Kn\u00f6dtel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9687-6247","authenticated-orcid":false,"given":"Marc","family":"Reichenbach","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6100-955X","authenticated-orcid":false,"given":"Cornelia","family":"Wulf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6311-3251","authenticated-orcid":false,"given":"Sergio","family":"Pertuz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2571-8441","authenticated-orcid":false,"given":"Diana","family":"G\u00f6hringer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4258-2208","authenticated-orcid":false,"given":"Jo","family":"Vliegen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3518-0203","authenticated-orcid":false,"given":"Md Masoom","family":"Rabbani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-7895","authenticated-orcid":false,"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,10]]},"reference":[{"key":"17_CR1","unstructured":"L4Re - L4 runtime environment. https:\/\/os.inf.tu-dresden.de\/L4Re\/doc\/index.html. Accessed 1 Dec 2023"},{"key":"17_CR2","unstructured":"Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.R., Schunter, M.: SANA: secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS 2016 (2016)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Asokan, N., et al.: SEDA: scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 964\u2013975 (2015)","DOI":"10.1145\/2810103.2813670"},{"key":"17_CR4","unstructured":"Claire Wolf: PicoRV32 - A Size-Optimized RISC-V CPU. https:\/\/github.com\/YosysHQ\/picorv32. Accessed 1 Dec 2023"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Deb Nath, A.P., Ray, S., Basak, A., Bhunia, S.: System-on-chip security architecture and cad framework for hardware patch. In: 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 733\u2013738 (2018). https:\/\/doi.org\/10.1109\/ASPDAC.2018.8297409","DOI":"10.1109\/ASPDAC.2018.8297409"},{"key":"17_CR6","doi-asserted-by":"publisher","unstructured":"Dessouky, G., Sadeghi, A.R., Zeitouni, S.: SoK: secure FPGA multi-tenancy in the cloud: challenges and opportunities. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 487\u2013506 (2021). https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00040","DOI":"10.1109\/EuroSP51992.2021.00040"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Dushku, E., Rabbani, M.M., Vliegen, J., Braeken, A., Mentens, N.: Prove: provable remote attestation for public verifiability. J. Inf. Secur. Appl. 75, 103448 (2023)","DOI":"10.1016\/j.jisa.2023.103448"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Fricke, F.: A novel top to bottom toolchain for generating virtual coarse-grained reconfigurable arrays. In: 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), pp. 267\u2013268 (2021). https:\/\/doi.org\/10.1109\/FPL53798.2021.00051","DOI":"10.1109\/FPL53798.2021.00051"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"147212","DOI":"10.1109\/ACCESS.2021.3123874","volume":"9","author":"P Holzinger","year":"2021","unstructured":"Holzinger, P., Reichenbach, M.: The HERA methodology: reconfigurable logic in general-purpose computing. IEEE Access 9, 147212\u2013147236 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3123874","journal-title":"IEEE Access"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Huffmire, T., et al.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 281\u2013295 (2007). https:\/\/doi.org\/10.1109\/SP.2007.28","DOI":"10.1109\/SP.2007.28"},{"key":"17_CR11","unstructured":"lowRISC: Ibex RISC-V Core. https:\/\/github.com\/lowRISC\/ibex. Accessed 1 Dec 2023"},{"issue":"4","key":"17_CR12","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s11277-019-06376-0","volume":"107","author":"T Malche","year":"2019","unstructured":"Malche, T., Maheshwary, P., Kumar, R.: Environmental monitoring system for smart city based on secure internet of things (IoT) architecture. Wireless Pers. Commun. 107(4), 2143\u20132172 (2019)","journal-title":"Wireless Pers. Commun."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Mandebi Mbongue, J., Saha, S.K., Bobda, C.: Domain isolation in FPGA-accelerated cloud and data center applications. In: Proceedings of the 2021 on Great Lakes Symposium on VLSI, pp. 283\u2013288 (2021)","DOI":"10.1145\/3453688.3461527"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Mansouri, M., Jaballah, W.B., \u00d6nen, M., Rabbani, M.M., Conti, M.: FADIA: fairness-driven collaborative remote attestation. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, pp. 60\u201371. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3448300.3468284","DOI":"10.1145\/3448300.3468284"},{"key":"17_CR15","unstructured":"Microchip: ATSHA204A, Fast, Secure, and Cost Effective Symmetric Authentication. https:\/\/www.microchip.com\/en-us\/product\/atsha204a. Accessed 16 Oct 2023"},{"key":"17_CR16","unstructured":"Microchip: PIC32CM5164LS00064. https:\/\/www.microchip.com\/en-us\/product\/PIC32CM5164LS00064. Accessed 8 Dec 2023"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1016\/j.future.2017.12.031","volume":"87","author":"B Mukherjee","year":"2018","unstructured":"Mukherjee, B., et al.: Flexible IoT security middleware for end-to-end cloud-fog communication. Futur. Gener. Comput. Syst. 87, 688\u2013703 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Ouni, R., Saleem, K.: Framework for sustainable wireless sensor network based environmental monitoring. Sustainability 14(14), 8356 (2022)","DOI":"10.3390\/su14148356"},{"key":"17_CR19","unstructured":"Quectel: L96 Hardware Design. https:\/\/auroraevernet.ru\/upload\/iblock\/36c\/36c11c043ed14557903899eb54fc4657.pdf. Accessed 2 Oct 2023"},{"issue":"6","key":"17_CR20","doi-asserted-by":"publisher","first-page":"10240","DOI":"10.1109\/JIOT.2019.2936988","volume":"6","author":"MM Rabbani","year":"2019","unstructured":"Rabbani, M.M., Vliegen, J., Winderickx, J., Conti, M., Mentens, N.: Shela: scalable heterogeneous layered attestation. IEEE Internet Things J. 6(6), 10240\u201310250 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2936988","journal-title":"IEEE Internet Things J."},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Vliegen, J., Rabbani, M.M., Conti, M., Mentens, N.: SACHa: self-attestation of configurable hardware. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 746\u2013751 (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8714775","DOI":"10.23919\/DATE.2019.8714775"},{"key":"17_CR22","unstructured":"Zephyr Project memberss and individual contributors: NEORV32. https:\/\/github.com\/stnolting\/neorv32. Accessed 1 Dec 2023"},{"issue":"3","key":"17_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3340557","volume":"12","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qu, G.: Recent attacks and defenses on FPGA-based systems. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 12(3), 1\u201324 (2019)","journal-title":"ACM Trans. Reconfigurable Technol. Syst. (TRETS)"}],"container-title":["Lecture Notes in Computer Science","Applied Reconfigurable Computing. Architectures, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-55673-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T23:03:47Z","timestamp":1710198227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-55673-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031556722","9783031556739"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-55673-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Applied Reconfigurable Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aveiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"arc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.arc2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}