{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:41Z","timestamp":1725899981083},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_3","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"30-46","source":"Crossref","is-referenced-by-count":6,"title":["Key Attestation from Trusted Execution Environments"],"prefix":"10.1007","author":[{"given":"Kari","family":"Kostiainen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"ARM. Trustzone technology overview (2009), \n                    \n                      http:\/\/www.arm.com\/products\/security\/trustzone\/index.html"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-00587-9_6","volume-title":"Trusted Computing","author":"F. Baiardi","year":"2009","unstructured":"Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 81\u2013100. Springer, Heidelberg (2009)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-85893-5_10","volume-title":"Smart Card Research and Advanced Applications","author":"V. Costan","year":"2008","unstructured":"Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The trusted execution module: Commodity general-purpose trusted computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 133\u2013148. Springer, Heidelberg (2008), \n                    \n                      http:\/\/people.csail.mit.edu\/devadas\/pubs\/cardis08tem.pdf"},{"key":"3_CR4","unstructured":"Internet Crime\u00a0Complaint Center. Internet crime report (2008), \n                    \n                      http:\/\/www.ic3.gov\/media\/annualreport\/2008_IC3Report.pdf"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-47719-5_12","volume-title":"Information Security and Privacy","author":"N. Itoi","year":"2001","unstructured":"Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 130\u2013144. Springer, Heidelberg (2001)"},{"key":"3_CR6","unstructured":"JavaCard Technology, \n                    \n                      http:\/\/java.sun.com\/products\/javacard\/"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proc. of ACM Symposium on Information, Computer & Communications Security, ASIACCS 2009 (2009)","DOI":"10.1145\/1533057.1533074"},{"key":"3_CR8","unstructured":"The Programming Language Lua, \n                    \n                      http:\/\/www.lua.org\/"},{"key":"3_CR9","unstructured":"Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 179\u2013194. USENIX (2004)"},{"key":"3_CR10","unstructured":"Nokia. Symbian OS platform security, \n                    \n                      http:\/\/www.forum.nokia.com\/Technology_Topics\/Device_Platforms\/S60\/Platform_Security\/"},{"key":"3_CR11","unstructured":"Rundgren, A.: Subject key attestation in keygen2 (2009), \n                    \n                      http:\/\/webpki.org\/papers\/keygen2\/keygen2-key-attestation-1.pdf"},{"key":"3_CR12","unstructured":"SANS Institute. SANS Top-20 2007 Security Risks (November 2008), \n                    \n                      http:\/\/www.sans.org\/top20\/2007\/top20.pdf"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s10207-004-0033-0","volume":"3","author":"S.W. Smith","year":"2004","unstructured":"Smith, S.W.: Outbound authentication for programmable secure coprocessors. International Journal of Information Security\u00a03, 28\u201341 (2004)","journal-title":"International Journal of Information Security"},{"key":"3_CR14","unstructured":"Srage, J., Azema, J.: M-Shield mobile security technology, TI White paper (2005), \n                    \n                      http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"3_CR15","unstructured":"Trusted Computing Group, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/home"},{"key":"3_CR16","unstructured":"TCG Infrastructure Workgroup. Subject Key Attestation Evidence Extension Specification Version 1.0 Revision 7 (June 2005), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/IWG\/"},{"key":"3_CR17","unstructured":"Trusted Platform Module (TPM) Specifications, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:14:58Z","timestamp":1619770498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}