{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T11:00:12Z","timestamp":1753182012282},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005862"},{"type":"electronic","value":"9783642005879"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00587-9_12","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T05:45:02Z","timestamp":1234849502000},"page":"183-196","source":"Crossref","is-referenced-by-count":14,"title":["Attacking the BitLocker Boot Process"],"prefix":"10.1007","author":[{"given":"Sven","family":"T\u00fcrpe","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Poller","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Steffan","sequence":"additional","affiliation":[]},{"given":"Jan-Peter","family":"Stotz","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Trukenm\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Mitchell, C.J. (ed.): Research workshop on future TPM functionality: Final report, http:\/\/www.softeng.ox.ac.uk\/etiss\/trusted\/research\/TPM.pdf","key":"12_CR1"},{"key":"12_CR2","first-page":"65","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farbert, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65\u201371. IEEE Computer Society, Los Alamitos (1997)"},{"unstructured":"Fergusson, N.: AES-CBC + Elephant diffuser: A disk encryption algorithm for windows vista. Tech. rep., Microsoft (2006)","key":"12_CR3"},{"unstructured":"Microsoft TechNet. BitLocker Drive Encryption Technical Overview (May 8, 2008), http:\/\/technet.microsoft.com\/en-us\/library\/cc732774.aspx","key":"12_CR4"},{"unstructured":"NVlabs: NVbit: Accessing bitlocker volumes from linux. Web page (2008), http:\/\/www.nvlabs.in\/node\/9","key":"12_CR5"},{"key":"12_CR6","volume-title":"Proceedings of the Eleventh SIGOPS European Workshop, ACM SIGOPS","author":"J. Hendricks","year":"2004","unstructured":"Hendricks, J., van Doorn, L.: Secure bootstrap is not enough: Shoring up the trusted computing base. In: Proceedings of the Eleventh SIGOPS European Workshop, ACM SIGOPS. ACM Press, New York (2004)"},{"doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. Tech. rep., Princeton University (2008)","key":"12_CR7","DOI":"10.1145\/1506409.1506429"},{"unstructured":"Becher, M., Dornseif, M., Klein, C.N.: Firewire: all your memory are belong to us. Slides, http:\/\/md.hudora.de\/presentations\/#firewire-cansecwest","key":"12_CR8"},{"key":"12_CR9","first-page":"31","volume-title":"Proceedings of New Security Paradigms Workshop","author":"S.J. Templeton","year":"2000","unstructured":"Templeton, S.J., Levitt, K.: A requires\/provides model for computer attacks. In: Proceedings of New Security Paradigms Workshop, pp. 31\u201338. ACM Press, New York (2000)"},{"unstructured":"Sparks, E.R.: Security assessment of trusted platform modules. Tech. rep., Dartmouth College (2007)","key":"12_CR10"},{"unstructured":"Sparks, E.R.: TPM reset attack. Web page, http:\/\/www.cs.dartmouth.edu\/~pkilab\/sparks\/","key":"12_CR11"},{"unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt. In: Proceedings of the 8th USENIX Security Symposium (1999)","key":"12_CR12"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-44499-8_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"S.H. Weingart","year":"2000","unstructured":"Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 302\u2013317. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Weingart, S.: Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses 2008, updated from the ches 2000 version (2008), http:\/\/www.atsec.com\/downloads\/pdf\/phy_sec_dev.pdf","key":"12_CR14","DOI":"10.1007\/3-540-44499-8_24"},{"unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: Distance bounding against smartcard relay attacks. In: USENIX Security 2007 (2007)","key":"12_CR15"},{"unstructured":"Tygar, J.D., Yee, B.: Dyad: A system for using physically secure coprocessors. In: Tech. rep., Proceedings of the Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment (1991)","key":"12_CR16"},{"unstructured":"Grawrock, D.: The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Intel Press (2006)","key":"12_CR17"},{"doi-asserted-by":"crossref","unstructured":"Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369\u20131376 (2008), doi:10.1109\/ARES.2008.109","key":"12_CR18","DOI":"10.1109\/ARES.2008.109"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00587-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T22:33:36Z","timestamp":1558132416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00587-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005862","9783642005879"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00587-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}