{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:21:03Z","timestamp":1725585663185},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215988"},{"type":"electronic","value":"9783642215995"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21599-5_15","type":"book-chapter","created":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T20:31:47Z","timestamp":1308083507000},"page":"202-216","source":"Crossref","is-referenced-by-count":1,"title":["Enforcing Executing-Implies-Verified with the Integrity-Aware Processor"],"prefix":"10.1007","author":[{"given":"Michael","family":"LeMay","sequence":"first","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Advanced Micro Devices: AMD64 architecture programmers manual. System Programming, vol. 2. Publication Number: 24593 (June 2010)","key":"15_CR1"},{"unstructured":"ARM Limited: ARM security technology\u2014Building a secure system using TrustZone technology. PRD29-GENC-009492C (April 2009)","key":"15_CR2"},{"doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Sezer, E.C., Zhang, X.: HIMA: A hypervisor-based integrity measurement agent. In: Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, HI, USA, pp. 461\u2013470 (December 2009)","key":"15_CR3","DOI":"10.1109\/ACSAC.2009.50"},{"doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, IL, USA, pp. 38\u201349 (October 2010)","key":"15_CR4","DOI":"10.1145\/1866307.1866313"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"unstructured":"Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a board range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, Security 2003, Washington, DC, USA (August 2003)","key":"15_CR6"},{"doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, VA, USA, pp. 27\u201338 (October 2008)","key":"15_CR7","DOI":"10.1145\/1455770.1455776"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Duflot, L., Levillain, O., Morin, B., Grumelard, O.: Getting into the SMRAM: SMM reloaded. In: CanSecWest 2009, Vancouver, Canada (March 2009)","key":"15_CR9"},{"unstructured":"Intel: Intel trusted execution technology software development guide. Document Number: 315168-006 (December 2009)","key":"15_CR10"},{"unstructured":"International Business Machines: IBM X-Force 2010 mid-year trend and risk report (August 2010), http:\/\/www.ibm.com\/services\/us\/iss\/xforce\/trendreports\/","key":"15_CR11"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/978-3-642-04444-1_40","volume-title":"Computer Security \u2013 ESORICS 2009","author":"M. LeMay","year":"2009","unstructured":"LeMay, M., Gunter, C.A.: Cumulative Attestation Kernels for Embedded Systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 655\u2013670. Springer, Heidelberg (2009)"},{"unstructured":"Litty, L., Lagar-Cavilla, H.A., Lie, D.: Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th USENIX Security Symposium, Security 2008, San Jose, CA, USA, pp. 243\u2013258 (July 2008)","key":"15_CR13"},{"doi-asserted-by":"crossref","unstructured":"McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB reduction and attestation. In: Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 143\u2013158 (May 2010)","key":"15_CR14","DOI":"10.1109\/SP.2010.17"},{"doi-asserted-by":"crossref","unstructured":"Murase, M., Shimizu, K., Plouffe, W., Sakamoto, M.: Effective implementation of the cell broadband engine(TM) isolation loader. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, Chicago, IL, USA, pp. 303\u2013313 (November 2009)","key":"15_CR15","DOI":"10.1145\/1653662.1653699"},{"unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, Security 2004, San Diego, CA, USA (August 2004)","key":"15_CR16"},{"doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: SCUBA: Secure code update by attestation in sensor networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006, Los Angeles, CA, USA, pp. 85\u201394 (September 2006)","key":"15_CR17","DOI":"10.1145\/1161289.1161306"},{"doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, Stevenson, WA, USA, pp. 335\u2013350 (October 2007)","key":"15_CR18","DOI":"10.1145\/1294261.1294294"},{"unstructured":"SHA-3 proposal BLAKE, http:\/\/131002.net\/blake\/","key":"15_CR19"},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Stavrou, A., Ghosh, A.: HyperCheck: A hardware-assisted integrity monitor. In: Proceedings of the 13th international symposium on Recent Advances in Intrusion Detection, RAID 2010, Ottawa, ON, CA , pp. 158\u2013177 (September 2010)","key":"15_CR20","DOI":"10.1007\/978-3-642-15512-3_9"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21599-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T14:50:34Z","timestamp":1560264634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21599-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215988","9783642215995"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21599-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}