{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:12Z","timestamp":1749701652714,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_72","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"747-756","source":"Crossref","is-referenced-by-count":0,"title":["Chain-of-Trust for Microcontrollers using SRAM PUFs: the Linux Case Study"],"prefix":"10.1007","author":[{"given":"Domenico","family":"Amelino","sequence":"first","affiliation":[]},{"given":"Mario","family":"Barbareschi","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"72_CR1","doi-asserted-by":"crossref","unstructured":"Amato, F., Barbareschi, M., Casola, V., Mazzeo, A.: An fpga-based smart classifier for decision support systems. In: Intelligent Distributed Computing VII, pp. 289\u2013299. Springer (2014)","DOI":"10.1007\/978-3-319-01571-2_34"},{"key":"72_CR2","doi-asserted-by":"crossref","unstructured":"Amato, F., De Pietro, G., Esposito, M., Mazzocca, N.: An integrated framework for securing semi-structured health records. Knowledge-Based Systems 79, 99\u2013117 (2015)","DOI":"10.1016\/j.knosys.2015.02.004"},{"key":"72_CR3","unstructured":"Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Transactions on Data Privacy 8(3), 273\u2013296 (2015)"},{"key":"72_CR4","doi-asserted-by":"crossref","unstructured":"Amelino, D., Barbareschi, M., Battista, E., Mazzeo, A.: How to manage keys and reconfiguration in wsns exploiting sram based pufs. In: Intelligent Interactive Multimedia Systems and Services 2016, pp. 109\u2013119. Springer (2016)","DOI":"10.1007\/978-3-319-39345-2_10"},{"key":"72_CR5","unstructured":"Bajikar, S.: Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation pp. 1\u201320 (2002)"},{"key":"72_CR6","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90\u00a0nm microcontroller sram puf quality. In: Design & Technology of Integrated Systems In Nanoscale Era (DTIS). pp. 1\u20136. 2015 10th IEEE International Conference On. IEEE (2015)","DOI":"10.1109\/DTIS.2015.7127360"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on. pp. 394\u2013399. IEEE (2014)","DOI":"10.1109\/IRI.2014.7051916"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Cilardo, A., Mazzeo, A.: Partial fpga bitstream encryption enabling hardware drm in mobile environments. In: Proceedings of the ACM International Conference on Computing Frontiers. pp. 443\u2013448. ACM (2016)","DOI":"10.1145\/2903150.2911711"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Di Natale, G., Torres, L.: Ring oscillators analysis for security purposes in spartan-6 fpgas. Microprocessors and Microsystems (2016)","DOI":"10.1016\/j.micpro.2016.06.005"},{"key":"72_CR10","doi-asserted-by":"crossref","unstructured":"Barker, E., Kelsey, J.: Nist special publication 800-90a: Recommendation for random number generation using deterministic random bit generators (2012)","DOI":"10.6028\/NIST.SP.800-90a"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. p. 175. ACM (2015)","DOI":"10.1145\/2744769.2747946"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Cilardo, A.: New techniques and tools for application-dependent testing of FPGA-based components. IEEE Transactions on Industrial Informatics 11(1), 94\u2013103 (2015)","DOI":"10.1109\/TII.2014.2370532"},{"key":"72_CR13","doi-asserted-by":"crossref","unstructured":"Cilardo, A., Fusella, E., Gallo, L., Mazzeo, A.: Exploiting concurrency for the automated synthesis of MPSoC interconnects. ACM Transactions on Embedded Computing Systems 14(3) (2015)","DOI":"10.1145\/2700075"},{"key":"72_CR14","doi-asserted-by":"crossref","unstructured":"Cilardo, A., Mazzeo, A., Romano, L., Saggese, G.: An FPGA-based key-store for improving the dependability of security services. pp. 389\u2013396 (2005)","DOI":"10.1109\/WORDS.2005.16"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digitalcontents. IET Computers & Digital Techniques 8(6), 300\u2013310 (2014)","DOI":"10.1049\/iet-cdt.2014.0036"},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65\u00a0nm technology. In: Nordic Conference on Secure IT Systems. pp. 47\u201364. Springer (2011)","DOI":"10.1007\/978-3-642-29615-4_5"},{"key":"72_CR17","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques. pp. 523\u2013540. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"72_CR18","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security. pp. 148\u2013160. ACM (2002)","DOI":"10.1145\/586110.586132"},{"key":"72_CR19","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: International workshop on Cryptographic Hardware and Embedded Systems. pp. 63\u201380. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"72_CR20","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Audio-and Video-Based Biometric Person Authentication. pp. 393\u2013402. Springer (2003)","DOI":"10.1007\/3-540-44887-X_47"},{"key":"72_CR21","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from flip-flops on reconfigurable devices. In: 3rd Benelux workshop on information and system security (WISSec 2008). vol. 17 (2008)"},{"key":"72_CR22","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC press (1996)","DOI":"10.1201\/9781439821916"},{"key":"72_CR23","doi-asserted-by":"crossref","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","DOI":"10.1126\/science.1074376"},{"key":"72_CR24","unstructured":"STMicroelectronics: RM0090 Reference manual (10 2015)"},{"key":"72_CR25","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. Journal of network and computer applications 42, 120\u2013134 (2014)","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"72_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, S., Zhang, Q., Hu, G., Qin, Y., Feng, D.: Providing root of trust for arm trustzone using on-chip sram. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices. pp. 25\u201336. ACM (2014)","DOI":"10.1145\/2666141.2666145"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:00:56Z","timestamp":1749668456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_72","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}