{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:44Z","timestamp":1725551204706},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_25","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"316-323","source":"Crossref","is-referenced-by-count":2,"title":["Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Loinig","sequence":"first","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]},{"given":"Reinhold","family":"Weiss","sequence":"additional","affiliation":[]},{"given":"Ernst","family":"Haselsteiner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MC.2003.1193231","volume":"36","author":"P. Schaumont","year":"2003","unstructured":"Schaumont, P., Verbauwhede, I.: Domain-specific codesign for embedded security. Computer\u00a036(4), 68\u201374 (2003)","journal-title":"Computer"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design, pp. 753\u2013760 (2004)","DOI":"10.1145\/996566.996771"},{"issue":"6","key":"25_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B. Chess","year":"2004","unstructured":"Chess, B., McGraw, G.: Static analysis for security. IEEE Security & Privacy\u00a02(6), 76\u201379 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/11767138_4","volume-title":"Advanced Information Systems Engineering","author":"V. Bryl","year":"2006","unstructured":"Bryl, V., Massacci, F., Mylopoulos, J., Zannone, N.: Designing Security Requirements Models Through Planning. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol.\u00a04001, pp. 33\u201347. Springer, Heidelberg (2006)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Ernst, M.D.: Type Annotations Specification (JSR 308) (November 2008)","DOI":"10.1163\/157338308X365594"},{"issue":"5","key":"25_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MS.2002.1032846","volume":"19","author":"J. Newkirk","year":"2002","unstructured":"Newkirk, J., Vorontsov, A.: How .NET\u2019s custom attributes affect design. IEEE Software\u00a019(5), 18\u201320 (2002)","journal-title":"IEEE Software"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-72354-7_14","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"K. Eagles","year":"2007","unstructured":"Eagles, K., Markantonakis, K., Mayes, K.: A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 161\u2013174. Springer, Heidelberg (2007)"},{"key":"25_CR8","first-page":"1","volume-title":"WESS 2009: Proceedings of the 4th Workshop on Embedded Systems Security","author":"A.A. Sere","year":"2009","unstructured":"Sere, A.A., Iguchi-Cartigny, J., Lanet, J.L.: Automatic detection of fault attack and countermeasures. In: WESS 2009: Proceedings of the 4th Workshop on Embedded Systems Security, pp. 1\u20137. ACM, New York (2009)"},{"key":"25_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/047085670X","volume-title":"Smart Card Handbook","author":"W. Rankl","year":"2003","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Inc., New York (2003)"},{"key":"25_CR10","unstructured":"Common Criteria: Application of Attack Potential to Smartcards Version 2.7 Revision 1 (March 2009)"},{"key":"25_CR11","unstructured":"Sun Microsystems, Inc.: Java Card Platform Specification 2.2.2"},{"key":"25_CR12","unstructured":"Sun Microsystems: Java Card Development Kit (March 2006), http:\/\/java.sun.com\/javacard\/devkit\/"},{"key":"25_CR13","unstructured":"IEEE: Open SystemC Language Reference Manual (December 2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T18:47:08Z","timestamp":1685558828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}