{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:00:57Z","timestamp":1746504057278,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117362"},{"type":"electronic","value":"9783319117379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11737-9_19","type":"book-chapter","created":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T00:52:14Z","timestamp":1413334334000},"page":"284-299","source":"Crossref","is-referenced-by-count":5,"title":["Practical Analysis Framework for Software-Based Attestation Scheme"],"prefix":"10.1007","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jin Song","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: S&P, pp. 65\u201371. IEEE CS (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"issue":"7","key":"19_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"P. England","year":"2003","unstructured":"England, P., Lampson, B.W., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. IEEE Computer\u00a036(7), 55\u201362 (2003)","journal-title":"IEEE Computer"},{"key":"19_CR3","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: USENIX Security, pp. 223\u2013238. USENIX (2004)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In: DSN, pp. 115\u2013124. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270348"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: Swatt: Software-based attestation for embedded devices. In: S&P, pp. 272\u2013282. IEEE CS (2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11601494_3","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"M. Shaneck","year":"2005","unstructured":"Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.-D.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.K.: Scuba: Secure code update by attestation in sensor networks. In: WiSe, pp. 85\u201394. ACM (2006)","DOI":"10.1145\/1161289.1161306"},{"key":"19_CR8","unstructured":"Shankar, U., Chew, M., Tygar, J.D.: Side effects are not sufficient to authenticate software. In: USENIX Security, pp. 89\u2013102. USENIX (2004)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: CCS, pp. 400\u2013409. ACM (2009)","DOI":"10.1145\/1653662.1653711"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., McCune, J.M., Perrig, A.: Viper: verifying the integrity of peripherals\u2019 firmware. In: CCS, pp. 3\u201316. ACM (2011)","DOI":"10.1145\/2046707.2046711"},{"key":"19_CR11","unstructured":"\u201cTrusted Platform Module\u201d, http:\/\/www.trustedcomputinggroup.org\/developers\/trusted_platform_module"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.K.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: SOSP, pp. 1\u201316. ACM (2005)","DOI":"10.1145\/1095809.1095812"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25937-4_1","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: New cryptographic primitives based on multiword t-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/978-3-540-74477-1_97","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"Y.-G. Choi","year":"2007","unstructured":"Choi, Y.-G., Kang, J., Nyang, D.: Proactive code verification protocol in wireless sensor network. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol.\u00a04706, pp. 1085\u20131096. Springer, Heidelberg (2007)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: CCS, pp. 552\u2013561. ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to risc. In: CCS, pp. 27\u201338. ACM (2008)","DOI":"10.1145\/1455770.1455776"},{"key":"19_CR17","unstructured":"Kennell, R., Jamieson, L.H.: Establishing the genuinity of remote computer systems. In: USENIX Security, p. 21. USENIX (2003)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Giffin, J.T., Christodorescu, M., Kruger, L.: Strengthening software self-checksumming via self-modifying code. In: ACSAC, pp. 23\u201332. IEEE CS (2005)","DOI":"10.1109\/CSAC.2005.53"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed software-based attestation for node compromise detection in sensor networks. In: SRDS, pp. 219\u2013230. IEEE CS (2007)","DOI":"10.1109\/SRDS.2007.31"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Gardner, R.W., Garera, S., Rubin, A.D.: Detecting code alteration by creating a temporary memory bottleneck. IEEE Trans. Inf. Forensics Security\u00a04(4) (2009)","DOI":"10.1109\/TIFS.2009.2033231"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"AbuHmed, T., Nyamaa, N., Nyang, D.: Software-based remote code attestation in wireless sensor network. In: GLOBECOM, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/GLOCOM.2009.5425280"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-15497-3_39","volume-title":"Computer Security \u2013 ESORICS 2010","author":"D. Perito","year":"2010","unstructured":"Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 643\u2013662. Springer, Heidelberg (2010)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: S&P, pp. 239\u2013253. IEEE CS (2012)","DOI":"10.1109\/SP.2012.45"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A security framework for the analysis and design of software attestation. In: CCS, pp. 1\u201312. ACM (2013)","DOI":"10.1145\/2508859.2516650"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11737-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:24:59Z","timestamp":1746419099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11737-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117362","9783319117379"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11737-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}