{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:19:07Z","timestamp":1772547547042,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319420882","type":"print"},{"value":"9783319420899","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42089-9_29","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T06:36:30Z","timestamp":1467268590000},"page":"407-421","source":"Crossref","is-referenced-by-count":2,"title":["Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario"],"prefix":"10.1007","author":[{"given":"Toqeer","family":"Ali","sequence":"first","affiliation":[]},{"given":"Jawad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Tamleek","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Nauman","sequence":"additional","affiliation":[]},{"given":"Shahrulniza","family":"Musa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Canali, D., Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: A quantitative study of accuracy in system call-based malware detection. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 122\u2013132. ACM (2012)","DOI":"10.1145\/2338965.2336768"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-45474-8_11","volume-title":"Recent Advances in Intrusion Detection","author":"P Uppuluri","year":"2001","unstructured":"Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 172\u2013189. Springer, Heidelberg (2001)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Ni, L., Zheng, H.-Y.: An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In: 2007 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 3217\u20133222. IEEE (2007)","DOI":"10.1109\/ICMLC.2007.4370702"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Milenkovi\u0107, M., Milenkovi\u0107, A., Jovanov, E.: Hardware support forcode integrity in embedded processors. In: Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp. 55\u201365. ACM (2005)","DOI":"10.1145\/1086297.1086306"},{"key":"29_CR5","unstructured":"Trusting Computing Group (2014). http:\/\/www.trustedcomputinggroup.org\/ . Accessed 17 Dec 2015"},{"issue":"2","key":"29_CR6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., OHanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int. J. Inform. Secur. 10(2), 63\u201381 (2011). http:\/\/dx.doi.org\/10.1007\/s10207-011-0124-7","journal-title":"Int. J. Inform. Secur."},{"key":"29_CR7","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted computing, ser. STC 2008, pp. 11\u201320. ACM, New York (2008). http:\/\/doi.acm.org\/10.1145\/1456455.1456458","DOI":"10.1145\/1456455.1456458"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: IEEE\/IFIP International Conference on Dependable Systems & Networks, DSN 2009, pp. 115\u2013124. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270348"},{"issue":"6","key":"29_CR10","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2012.152","volume":"10","author":"M Prandini","year":"2012","unstructured":"Prandini, M., Ramilli, M.: Return-oriented programming. IEEE Secur. Priv. 10(6), 84\u201387 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475\u2013488. ACM (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linuxkernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ser. STC 2007, pp. 21\u201329. ACM, New York (2007). http:\/\/doi.acm.org\/10.1145\/1314354.1314362","DOI":"10.1145\/1314354.1314362"},{"key":"29_CR13","unstructured":"Liang, G., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on function execution (2009)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-14597-1_5","volume-title":"Trusted Systems","author":"TA Tanveer","year":"2010","unstructured":"Tanveer, T.A., Alam, M., Nauman, M.: Scalable remote attestation with privacy protection. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 73\u201387. Springer, Heidelberg (2010)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.-P.: Model-basedbehavioral attestation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 175\u2013184. ACM (2008)","DOI":"10.1145\/1377836.1377864"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p. 36. ACM (2014)","DOI":"10.1145\/2557977.2558002"},{"key":"29_CR17","unstructured":"Gong, Y., Mabu, S., Chen, C., Wang, Y., Hirasawa, K.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: ICCAS-SICE 2009, pp. 3463\u20133467. IEEE (2009)"},{"issue":"4","key":"29_CR18","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TC.2013.13","volume":"63","author":"G Creech","year":"2014","unstructured":"Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput. 63(4), 807\u2013819 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 116\u2013127. ACM (2007)","DOI":"10.1145\/1315245.1315261"},{"issue":"4","key":"29_CR20","first-page":"1193","volume":"14","author":"T Ali","year":"2011","unstructured":"Ali, T., Alam, M., Nauman, M., Ali, T., Ali, M., Anwar, S.: A scalable andprivacy preserving remote attestation mechanism. Inform. Int. Interdisc. J. 14(4), 1193\u20131203 (2011)","journal-title":"Inform. Int. Interdisc. J."},{"key":"29_CR21","unstructured":"Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ser. ICUIMC 2014, pp. 36:1\u201336:8. ACM, New York (2014). http:\/\/doi.acm.org\/10.1145\/2557977.2558002"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications -- ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42089-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T08:50:55Z","timestamp":1568105455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42089-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420882","9783319420899"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42089-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}