{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:40:01Z","timestamp":1725871201558},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494654"},{"type":"electronic","value":"9783319494661"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49466-1_6","type":"book-chapter","created":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T06:50:07Z","timestamp":1478933407000},"page":"75-89","source":"Crossref","is-referenced-by-count":0,"title":["Re-visited: On the Value of Purely Software-Based Code Attestation for Embedded Devices"],"prefix":"10.1007","author":[{"given":"Maximilian","family":"Zeiser","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A security framework for the analysis, design of software attestation. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1\u201312. ACM (2013)","DOI":"10.1145\/2508859.2516650"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 400\u2013409. ACM (2009)","DOI":"10.1145\/1653662.1653711"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Che, W., Plusquellic, J., Bhunia, S.: A non-volatile memory based physically unclonable function without helper data. In: 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp. 148\u2013153. IEEE (2014)","DOI":"10.1109\/ICCAD.2014.7001345"},{"issue":"SI","key":"6_CR4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/844128.844143","volume":"36","author":"J Elson","year":"2002","unstructured":"Elson, J., Girod, L., Estrin, D.: Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Syst. Rev. 36(SI), 147\u2013163 (2002)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"6_CR5","unstructured":"TCG Mobile Phone Working Group et al.: TCG mobile trusted module specification. In: Trusted Computing Group (2010)"},{"key":"6_CR6","unstructured":"Kinney, S.L.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Newnes, Newton (2006)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 239\u2013253. IEEE (2012)","DOI":"10.1109\/SP.2012.45"},{"key":"6_CR8","unstructured":"Schulz, S., Wachsmann, C., Sadeghis, A.R.: Lightweight Remote Attestation using Physical Functions, Technische Universitat Darmstadt. Darmstadt. Tech. rep., Germany, Technical report (2011)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: Swatt: software-based attestation for embedded devices. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 272\u2013282. IEEE (2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Stecklina, O., Kornemann, S., Grehl, F., Jung, R., Kranz, T., Leander, G., Schweer, D., Mollus, K., Westhoff, D.: Custom-fit security for efficient, pollution-resistant multicast OTA-programming with fountain codes. In: 2015 15th International Conference on Innovations for Community Services (I4CS), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/I4CS.2015.7294492"},{"key":"6_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-319-28865-9_6","volume-title":"Security and Privacy in Communication Networks","author":"O Stecklina","year":"2015","unstructured":"Stecklina, O., Langend\u00f6rfer, P., Vater, F., Kranz, T., Leander, G.: Intrinsic code attestation by instruction chaining for embedded devices. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) Security and Privacy in Communication Networks. LNICSSITE, vol. 164, pp. 97\u2013115. Springer, Heidelberg (2015)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Vetter, B., Westhoff, D.: Simulation study on code attestation with compressed instruction code. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 296\u2013301. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197498"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49466-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:27:43Z","timestamp":1498346863000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49466-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494654","9783319494661"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49466-1_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}