{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:32:40Z","timestamp":1761597160389,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_40","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:34:44Z","timestamp":1252953284000},"page":"655-670","source":"Crossref","is-referenced-by-count":18,"title":["Cumulative Attestation Kernels for Embedded Systems"],"prefix":"10.1007","author":[{"given":"Michael","family":"LeMay","sequence":"first","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Southern california edison achieves key advanced metering goal. Electric Energy Online (August 2, 2007), http:\/\/electricenergyonline.com\/IndustryNews.asp?m=1&id=71649","key":"40_CR1"},{"unstructured":"TCG specification architecture overview. Trusted Computing Group (August 2, 2007), http:\/\/www.trustedcomputinggroup.org\/developers\/trusted_platform_module\/specifications","key":"40_CR2"},{"key":"40_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"unstructured":"Brown, B., et al.: AMI system security requirements (December 2008), http:\/\/osgug.ucaiug.org\/utilisec\/amisec\/default.aspx","key":"40_CR4"},{"unstructured":"Bellare, M., Yee, B.: Forward integrity for secure audit logs. ACM Transactions on Information and Systems Security (1997)","key":"40_CR5"},{"issue":"4","key":"40_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1002\/stvr.258","volume":"12","author":"C. Bernardeschi","year":"2002","unstructured":"Bernardeschi, C., Fantechi, A., Gnesi, S.: Model checking fault tolerant systems. Software Testing, Verification & Reliability\u00a012(4), 251\u2013275 (2002)","journal-title":"Software Testing, Verification & Reliability"},{"key":"40_CR7","first-page":"189","volume-title":"Proceedings of the 21st ACM Symposium on Operating Systems Principles","author":"B. Chun","year":"2007","unstructured":"Chun, B., Maniatis, P., Shenker, S., Kubiatowicz, J.: Attested append-only memory: making adversaries stick to their word. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp. 189\u2013204. ACM Press, New York (2007)"},{"unstructured":"Clavel, M., Duran, F., Eker, S., Lincoln, P., Mart\u0131-Oliet, N., Meseguer, J., Talcott, C.: Maude Manual (Version 2.1). SRI International, Menlo Park (April 2005)","key":"40_CR8"},{"doi-asserted-by":"crossref","unstructured":"David, F., Chan, E., Carlyle, J., Campbell, R.: Cloaker: Hardware Supported Rootkit Concealment. In: Proceeedings of the 29th IEEE Symposium on Security and Privacy, pp. 296\u2013310 (2008)","key":"40_CR9","DOI":"10.1109\/SP.2008.8"},{"key":"40_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/844128.844148","volume":"36","author":"G. Dunlap","year":"2002","unstructured":"Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P.: ReVirt: enabling intrusion analysis through virtual-machine logging and replay. ACM SIGOPS Operating Systems Review\u00a036, 211\u2013224 (2002)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/S1571-0661(05)82534-4","volume":"71","author":"S. Eker","year":"2004","unstructured":"Eker, S., Meseguer, J., Sridharanarayanan, A.: The Maude LTL Model Checker. Electronic Notes in Theoretical Computer Science\u00a071, 162\u2013187 (2004)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. LNCS, pp. 251\u2013261 (2001)","key":"40_CR12","DOI":"10.1007\/3-540-44709-1_21"},{"key":"40_CR13","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 193\u2013206. ACM Press, New York (2003)"},{"issue":"4","key":"40_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2006.85","volume":"4","author":"J. Herzog","year":"2006","unstructured":"Herzog, J.: Applying protocol analysis to security device interfaces. IEEE Security and Privacy\u00a04(4), 84\u201387 (2006)","journal-title":"IEEE Security and Privacy"},{"key":"40_CR15","first-page":"279","volume-title":"Proceedings of the 21st ACM Symposium on Operating Systems Principles","author":"O. Laadan","year":"2007","unstructured":"Laadan, O., Baratto, R., Phung, D., Potter, S., Nieh, J.: DejaView: a personal virtual computer recorder. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp. 279\u2013292. ACM Press, New York (2007)"},{"key":"40_CR16","volume-title":"Proceedings of the 40th Hawaii International Conference on System Sciences","author":"M. LeMay","year":"2007","unstructured":"LeMay, M., Gross, G., Gunter, C.A., Garg, S.: Unified architecture for large-scale attested metering. In: Proceedings of the 40th Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2007. IEEE, Los Alamitos (2007)"},{"unstructured":"Levin, D., Douceur, J.R., Lorch, J.R., Moscibroda, T.: TrInc: Small trusted hardware for large distributed systems. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (2009)","key":"40_CR17"},{"unstructured":"Liu, A., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (September 2005), http:\/\/cdl.csc.ncsu.edu\/software\/TinyECC\/","key":"40_CR18"},{"issue":"1","key":"40_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M. Matsumoto","year":"1998","unstructured":"Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation (TOMACS)\u00a08(1), 3\u201330 (1998)","journal-title":"ACM Transactions on Modeling and Computer Simulation (TOMACS)"},{"unstructured":"Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 233\u2013238. USENIX Association (2004)","key":"40_CR20"},{"doi-asserted-by":"crossref","unstructured":"Schmidt, A., Kuntze, N., Kasper, M.: On the deployment of Mobile Trusted Modules. In: Proceedings of the 9th IEEE Conference on Wireless Communications and Networking, pp. 3169\u20133174","key":"40_CR21","DOI":"10.1109\/WCNC.2008.553"},{"doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: Proceedings of the 25th IEEE Symposium on Security and Privacy, pp. 272\u2013282 (2004)","key":"40_CR22","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1314333.1314353","volume-title":"Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society","author":"C. Troncoso","year":"2007","unstructured":"Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: Pripayd: privacy friendly pay-as-you-drive insurance. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 99\u2013107. ACM Press, New York (2007)"},{"key":"40_CR24","volume-title":"Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing","author":"J. Winter","year":"2008","unstructured":"Winter, J.: Trusted Computing building blocks for embedded Linux-based ARM TrustZone platforms. In: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing. ACM Press, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T04:17:58Z","timestamp":1739333878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}