{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T14:40:02Z","timestamp":1748702402944,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_7","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:35Z","timestamp":1448381915000},"page":"50-68","source":"Crossref","is-referenced-by-count":11,"title":["Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction"],"prefix":"10.1007","author":[{"given":"Yanlin","family":"Li","sequence":"first","affiliation":[]},{"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"7_CR1","unstructured":"ARM. Cortex-A8 technical reference manual. Revision:r3p2, May 2010"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A security framework for the analysis and design of software attestation. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 1\u201312 (2013)","DOI":"10.1145\/2508859.2516650"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-642-32009-5_36","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"R Bardou","year":"2012","unstructured":"Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.-K.: Efficient padding oracle attacks on cryptographic hardware. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 608\u2013625. Springer, Heidelberg (2012)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the ACM Conference on Computer and Communications Security, November 2009","DOI":"10.1145\/1653662.1653711"},{"key":"7_CR5","unstructured":"Erdos, P., Renyi, A.: On a classical problem of probability theory. In: Proceedings of Magyar Tudomanyos Akademia Matematikai Kutato Intezetenek Kozlemenyei, pp. 215\u2013220 (1961)"},{"key":"7_CR6","unstructured":"Franklin, J., Luk, M., Seshadri, A., Perrig, A.: Prism: enabling personal verification of code integrity, untampered execution, and trusted I\/O or human-verifiable code execution. CyLab Lab Technical report CMU-CyLab-07-010, Carnegie Mellon University (2007)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Huelsbergen, L.: Software integrity protection using timed executable agents. In: Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 189\u2013200 (2006)","DOI":"10.1145\/1128817.1128847"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-319-12400-1_11","volume-title":"Security Protocols XXII","author":"V Gligor","year":"2014","unstructured":"Gligor, V.: Dancing with the adversary: a tale of wimps and giants. In: Christianson, B., Malcolm, J., Maty\u00e1\u0161, V., \u0160venda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 100\u2013115. Springer, Heidelberg (2014)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kailar, R., Gligor, V., Gong, L.: Effectiveness analysis of cryptographic protocols. In: Proceedings of IFIP Conference on Distributed Computing for Critical Applications. Springer, January 1994","DOI":"10.1007\/978-3-7091-9396-9_12"},{"key":"7_CR10","unstructured":"Kennell, R., Jamieson, L.H.: Establishing the genuinity of remote computer systems. In: Proceedings of the USENIX Security Symposium, pp. 295\u2013308 (2003)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kim, T.H.-J., Huang, L.-S., Perrig, A., Jackson, C., Gligor, V.: Accountable Key Infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of International World Wide Web Conference (WWW) (2013)","DOI":"10.1145\/2488388.2488448"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A Klimov","year":"2002","unstructured":"Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523. Springer, Heidelberg (2002)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 239\u2013253 (2012)","DOI":"10.1109\/SP.2012.45"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13869-0_2","volume-title":"Trust and Trustworthy Computing","author":"Y Li","year":"2010","unstructured":"Li, Y., McCune, J.M., Perrig, A.: SBAP: software-based attestation for peripherals. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 16\u201329. Springer, Heidelberg (2010)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., McCune, J.M., Perrig, A.: VIPER: verifying the integrity of peripherals\u2019 firmware. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 3\u201316 (2011)","DOI":"10.1145\/2046707.2046711"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-14215-4_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"L Martignoni","year":"2010","unstructured":"Martignoni, L., Paleari, R., Bruschi, D.: Conqueror: tamper-proof code execution on legacy systems. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 21\u201340. Springer, Heidelberg (2010)"},{"key":"7_CR18","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1460-5","volume-title":"Bootstrapping Trust in Modern Computers","author":"B Parno","year":"2011","unstructured":"Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers. SpringerBriefs in Computer Science, vol. 10. Springer, New York (2011)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sagoian, C., Stamm, S.: Certified lies: detecting and defeating government interception attacks against SSL. In: Proceedings of ACM Symposium on Operating Systems Principles, pp. 1\u201318 (2010)","DOI":"10.2139\/ssrn.1591033"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: Proceedings of ACM Workshop on Wireless Security, pp. 85\u201394 (2006)","DOI":"10.1145\/1161289.1161306"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of ACM Symposium on Operating Systems Principles, pp. 335\u2013350 (2007)","DOI":"10.1145\/1323293.1294294"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms. In: Proceedings of ACM Symposium on Operating Systems Principles, pp. 1\u201316, October 2005","DOI":"10.1145\/1095809.1095812"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 272\u2013282 (2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11601494_3","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"M Shaneck","year":"2005","unstructured":"Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.-D.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"7_CR25","unstructured":"Shankar, U., Chew, M., Tygar, J.: Side effects are not sufficient to authenticate software. In: Proceedings of the USENIX Security Symposium (2004)"},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/353323.353383","volume":"3","author":"D Spinellis","year":"2000","unstructured":"Spinellis, D.: Reflection as a mechanism for software integrity verification. ACM Trans. Inf. Syst. Secur. 3(1), 51\u201362 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR27","series-title":"Integrated Circuits and Systems","first-page":"6","volume-title":"Clocking in Modern VLSI Systems, Chap. 2","author":"S Tam","year":"2009","unstructured":"Tam, S.: Modern clock distribution systems. In: Xanthopoulos, T. (ed.) Clocking in Modern VLSI Systems, Chap. 2. Integrated Circuits and Systems, pp. 6\u201395. Springer, USA (2009)"},{"key":"7_CR28","unstructured":"Texas Instruments. AM\/DM37X multimedia device technical reference manual. Version R, September 2012"},{"key":"7_CR29","unstructured":"The Trusted Computing Group. TPM Main specification version 1.2 (revision 116) (2011)"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1145\/1015047.1015052","volume":"3","author":"T Wollinger","year":"2004","unstructured":"Wollinger, T., Guajardo, J., Paar, C.: Security on FPGAs: state-of-the-art implementations and attacks. ACM Trans. Embed. Comput. Syst. (TECS) 3, 534\u2013574 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Wurster, G., van Oorschot, P., Anil, S.: A generic attack on checksumming-based software tamper resistance. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 127\u2013138 (2005)","DOI":"10.1109\/SP.2005.2"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-41717-7_12","volume-title":"Security Protocols XXI","author":"J Zhao","year":"2013","unstructured":"Zhao, J., Gligor, V., Perrig, A., Newsome, J.: ReDABLS: revisiting device attestation with bounded leakage of secrets. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 94\u2013114. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T14:07:08Z","timestamp":1748700428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}