{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:45:17Z","timestamp":1743079517519,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_2","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"19-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of an Embedded Platform for Secure CPS Services"],"prefix":"10.1007","author":[{"given":"Vincent","family":"Raes","sequence":"first","affiliation":[]},{"given":"Jan","family":"Vossaert","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"Trans. Inf. Theory"},{"key":"2_CR2","unstructured":"Feske, N.: Genode Operating System Framework 15.05"},{"key":"2_CR3","unstructured":"Freescale Semiconductor Inc.: i.MX6 Processor Reference Manual (2013)"},{"key":"2_CR4","unstructured":"Ge, X., Vijayakumar, H., Jaeger, T.: SPROBES: enforcing kernel code integrity on the trustzone architecture. In: Proceedings of the Mobile Security Technologies 2014 Workshop (2014)"},{"key":"2_CR5","first-page":"253","volume":"2013","author":"OS Hofmann","year":"2013","unstructured":"Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: InkTag: secure applications on an untrusted operating system. ASPLOS 2013, 253\u2013264 (2013)","journal-title":"ASPLOS"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Jacobs, B., Smans, J., Piessens, F.: A quick tour of the verifast program verifier. In: Ueda, K. (ed.) APLAS 2010. LNCS, vol. 6461, pp. 304\u2013311. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-17164-2_21","DOI":"10.1007\/978-3-642-17164-2_21"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an OS kernel. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP 2009, pp. 207\u2013220. ACM, New York (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"2_CR8","unstructured":"Laginimaineb: Extracting Qualcomm\u2019s Keymaster Keys (2016). \nhttp:\/\/bits-please.blogspot.be\/2016\/06\/extracting-qualcomms-keymaster-keys.html"},{"key":"2_CR9","unstructured":"Mayer, C.P.: Security and privacy challenges in the internet of things. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. ECEASST 17, 1\u201312 (2009)"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Nipkow, T., Wenzel, M., Paulson, L.C.: Isabelle\/HOL: Proof Assistant for Higher-order Logic, vol. 2283. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45949-9","DOI":"10.1007\/3-540-45949-9"},{"key":"2_CR11","unstructured":"Noorman, J., Preneel, B., Agten, P., Daniels, W., Strackx, R., Huygens, C., Piessens, F., Van Herrewege, A., Verbauwhede, I.: Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In: 22nd USENIX Security (2013). K U Leuven"},{"key":"2_CR12","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using ARM TrustZone to Build a Trusted Language Runtime for Mobile Applications (i)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Trusted language runtime (TLR): enabling trusted applications on smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile), pp. 21\u201326 (2011)","DOI":"10.1145\/2184489.2184495"},{"key":"2_CR14","unstructured":"Freescale Semiconductor: Secure Boot on i.MX50, i.MX53, and i.MX 6 Series using HABv4, pp. 1\u201322 (2012)"},{"key":"2_CR15","unstructured":"Shen, D.: Exploiting Trustzone on Android. Black Hat (2015)"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Strackx, R., Noorman, J., Verbauwhede, I., Preneel, B., Piessens, F.: Protected software module architectures. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2013 Securing Electronic Business Processes, pp. 241\u2013251. Springer, Wiesbaden (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-658-03371-2_21","DOI":"10.1007\/978-3-658-03371-2_21"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Zha, Z., Li, M., Zang, W., Yu, M. and Chen, S.: AppGuard: a hardware virtualization based approach on protecting user applications from untrusted commodity operating system. In: 2015 International Conference on Computing, Networking and Communications, ICNC 2015, pp. 685\u2013689 (2015)","DOI":"10.1109\/ICCNC.2015.7069428"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T08:45:33Z","timestamp":1517388333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}