{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:14:18Z","timestamp":1742926458023,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175688"},{"type":"electronic","value":"9783642175695"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17569-5_36","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T06:24:09Z","timestamp":1290752649000},"page":"365-375","source":"Crossref","is-referenced-by-count":2,"title":["FEDTIC: A Security Design for Embedded Systems with Insecure External Memory"],"prefix":"10.1007","author":[{"given":"Mei","family":"Hong","sequence":"first","affiliation":[]},{"given":"Hui","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Gelbart, O., Leontie, E., Narahari, B., Simha, R.: A compiler-hardware approach to software protection for embedded systems. Computers and Electrical Engineering, 315\u2013328 (2009)","DOI":"10.1016\/j.compeleceng.2008.06.010"},{"key":"36_CR2","unstructured":"Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: 17th International Conference on VLSI Design (2004)"},{"key":"36_CR3","unstructured":"Best, R.M.: Prevent software piracy with crypto-microprocessors. In: IEEE Computer Society International Conference (1980)"},{"key":"36_CR4","unstructured":"Dallas Semiconductor (2008), http:\/\/www.maximic.com\/Microcontroller.cfm"},{"key":"36_CR5","unstructured":"Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: 32nd Annual Symposium on Foundations of Computer Science (1991)"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Lie, D., Chandramohan, T., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. In: 9th Internatinal Conference Architectural Support for Programming Languages and Operating Systems, ASPLOS-IX (2000)","DOI":"10.21236\/ADA419599"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an untrusted operating system on trusted hardware. In: 19th ACM Symposium on Operating System Principles (2003)","DOI":"10.1145\/945445.945463"},{"key":"36_CR8","unstructured":"Suh, G.E., Clarke, D., Gasend, B., van Dijk, M., Devadas, S.: AEGIS:architecure for tamper-evident and tamper-resistant processing. In: International Conference on SuperComputing (2003)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Suh, G.E., \u00f3Donnell, C.W., Sachdev, I., Devadas, S.: Design and implementation of the AEGIS single-chip secure processor using physical random functions. In: 32nd Interntional Symposium on Computer Architecture, ISCA (2005)","DOI":"10.1145\/1080695.1069974"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Suh, G.E., \u00f3Donnell, C.W., Sachdev, I., Devadas, S.: AEGIS: A single-chip secure processor. IEEE Design and Test of Computers, 467\u2013477 (2007)","DOI":"10.1109\/MDT.2007.4343587"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Duc, G., Keryell, R.: Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection. In: 22nd Annual Computer Security Applications Conference, ACSAC 2006 (2006)","DOI":"10.1109\/ACSAC.2006.21"},{"key":"36_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-540-74735-2_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"R. Elbaz","year":"2007","unstructured":"Elbaz, R., Champagne, D., Lee, R.B., Torres, L.: Tec-tree: a low-cost, parallelizable tree for efficient defense against memory replay attacks. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 289\u2013302. Springer, Heidelberg (2007)"},{"issue":"4","key":"36_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M. Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology\u00a021(4), 469\u2013491 (2008)","journal-title":"Journal of Cryptology"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: ACM conference on Computer and communications Security (2001)","DOI":"10.1145\/502010.502011"},{"key":"36_CR15","unstructured":"Austin, T.M., Burger, D.B.: The simplescalar tool set, version 3.0. Technical report, University of Wisconsin-madision (1997)"},{"key":"36_CR16","unstructured":"Helion Technology Datasheet: high performance AES (Rijndael) cores for Xilinx FPGAs (2008), http:\/\/www.heliontech.com"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Henning, J.L.: SPEC CPU 2000: Measuing CPU performance in the new millennium. IEEE Computers (2000)","DOI":"10.1109\/2.869367"},{"key":"36_CR18","unstructured":"Guthaus, M.R., Ringenberg, J.S.: Mibench: a free, commercially representiative embedded benchmark suite. In: IEEE 4th Annual Workshop on Workload Characterization (2001)"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17569-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T05:18:47Z","timestamp":1636867127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17569-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175688","9783642175695"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17569-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}