{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:46:54Z","timestamp":1759132014889},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_2","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"16-29","source":"Crossref","is-referenced-by-count":35,"title":["SBAP: Software-Based Attestation for Peripherals"],"prefix":"10.1007","author":[{"given":"Yanlin","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonathan M.","family":"McCune","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Chen, K.: Reversing and exploiting and apple firmware update. In: Black Hat. (July 2009)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Scuba: Secure code update by attestation in sensor networks. In: ACM Workshop on Wireless Security (WiSe 2006) (2006)","DOI":"10.1145\/1161289.1161306"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-540-69170-9_25","volume-title":"Distributed Computing in Sensor Systems","author":"A. Seshadri","year":"2008","unstructured":"Seshadri, A., Luk, M., Perrig, A., Van Doorn, L., Khosla, P.: Sake: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol.\u00a05067, pp. 372\u2013385. Springer, Heidelberg (2008)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (November 2009)","DOI":"10.1145\/1653662.1653711"},{"key":"2_CR6","unstructured":"CYPRESS: Cypress encore ii low-speed usb peripheral controller (cy7c639xx)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Huffman, D.: A method for the construction of minimum redundancy codes. In: Proceedings of the IRE 40 (1962)","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return oriented programming to risc. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (October 2008)","DOI":"10.1145\/1455770.1455776"},{"key":"2_CR9","unstructured":"Hund, R., Holz, T., Freiling, F.: Return oriented rootkit: Bypassing kernel code integrity protection mechanisms. In: Proceedings of the 18th USENIX Security Symposium (August 2009)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return into libc without function calls (on the x86). In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-36400-5_34","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Klimov","year":"2003","unstructured":"Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 470\u2013483. Springer, Heidelberg (2003)"},{"key":"2_CR12","unstructured":"wikipedia, http:\/\/en.wikipedia.org\/wiki\/rc4"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Hars, L., Petruska, G.: Pseudo-random recursions: Small and fast pseudo-random number generator for embedded applications. EURASIP Journal on Embedded Systems (2007)","DOI":"10.1186\/1687-3963-2007-098417"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed software-based attestation for node compromise detection in sensor networks. In: Proceedings of IEEE International Symposium on Reliable Distributed Systems (2007)","DOI":"10.1109\/SRDS.2007.31"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:44:43Z","timestamp":1606185883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}