{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:01:49Z","timestamp":1725897709836},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_5","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T11:02:42Z","timestamp":1346929362000},"page":"49-61","source":"Crossref","is-referenced-by-count":0,"title":["Risk Analysis and Software Integrity Protection for 4G Network Elements in ASMONIA"],"prefix":"10.1007","author":[{"given":"Manfred","family":"Sch\u00e4fer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Official ASMONIA Project web-page, \n                    \n                      http:\/\/www.asmonia.de\/index.php?page=1"},{"key":"5_CR2","unstructured":"Egners, A., Sch\u00e4fer, M., Wessel, S.: ASMONIA Deliverable D2.1 \u201cEvaluating Methods to assure System Integrity and Requirements for Future Protection Concepts\u201d (April 2011)"},{"key":"5_CR3","unstructured":"Egners, A., Rey, E., Schneider, P., Wessel, S.: ASMONIA Deliverable D5.1, \u201cThreat and Risk Analysis for Mobile Communication Networks and Mobile Terminals\u201d (March 2011)"},{"key":"5_CR4","unstructured":"TCG, TPM Main Specifications, Parts 1-3, Specification Version 1.2, Level 2, Revisions 103 (July 2007), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"key":"5_CR5","unstructured":"Kursawe, K., Schellekens, D., Preneel, B.: Analyzing trusted platform communication. In: ECRYPT Workshop, CRASH - CRyptographic Advances in Secure Hardware (2005), \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/publications\/article-591.pdf"},{"key":"5_CR6","unstructured":"Sparks, E.: A Security Assessment of Trusted Platform Modules. Computer Science Tech. Report TR2007-597, Department of Computer Science Dartmouth College (2007)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-29804-2_12","volume-title":"Public Key Infrastructures, Services and Applications","author":"J. Winter","year":"2012","unstructured":"Winter, J., Dietrich, K.: A Hijacker\u2019s Guide to the LPC Bus. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol.\u00a07163, pp. 176\u2013193. Springer, Heidelberg (2012), \n                    \n                      www.cosic.esat.kuleuven.be\/europki2011\/pp\/preproc.pdf"},{"key":"5_CR8","unstructured":"Kauer, B.: OSLO: Improving the security of Trusted Computing. In: SS 2007 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007)"},{"key":"5_CR9","unstructured":"UEFI: Unified Extensible Firmware Interface, UEFI SPEC 2.3.1 (2011), \n                    \n                      http:\/\/www.uefi.org"},{"key":"5_CR10","unstructured":"Apvrille, A., Gordon, D., et al.: Ericsson DigSig: Run-time Authentication of Binaries at Kernel Level. In: Proceedings of the 18th Large Installation System Administration Conference (LISA 2004), Atlanta, November 14-19, pp. 59\u201366 (2004)"},{"key":"5_CR11","unstructured":"Apvrille, A., Gordon, D.: DigSig novelties. In: Libre Software Meeting (LSM 2005), Security Topic, Dijon, France, July 4-9 (2005), \n                    \n                      disec.sourceforge.net\/docs\/DigSig-novelties.pdf"},{"key":"5_CR12","unstructured":"KVM and QEMU, \n                    \n                      http:\/\/www.linux-kvm.org\/page\/Documents"},{"key":"5_CR13","unstructured":"Network file system (NFS) vers. 4, RFC 3530 (2003), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc3530"},{"key":"5_CR14","unstructured":"Arvind, S., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In: Proceed. of the ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, WA (October 2007)"},{"key":"5_CR15","unstructured":"RSBAC, Rule Set Bases Access Control, \n                    \n                      http:\/\/www.rsbac.org\/"},{"key":"5_CR16","unstructured":"SeLinux, Security Enhanced Linux, \n                    \n                      http:\/\/www.nsa.gov\/research\/selinux\/docs.shtml"},{"key":"5_CR17","unstructured":"PAX, \n                    \n                      http:\/\/pax.grsecurity.net\/docs\/index.html"},{"key":"5_CR18","unstructured":"ProPolice \/ Stack Smashing Protector, \n                    \n                      http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/\n                    \n                    \n                  , \n                    \n                      http:\/\/www.x.org\/wiki\/ProPolice"},{"key":"5_CR19","unstructured":"Sch\u00e4fer, M., Moeller, W.D.: Tailored Concepts for Software Integrity Protection in Mobile Networks. International Journal on Advances in Security\u00a04(1&2) (August 2011)"},{"key":"5_CR20","unstructured":"3GPP TS 33.320, \n                    \n                      http:\/\/www.3gpp.org\/ftp\/Specs\/archive\/33_series\/33.320\/33320-b30.zip"},{"key":"5_CR21","unstructured":"3GPP TS 33.401, \n                    \n                      http:\/\/www.3gpp.org\/ftp\/Specs\/archive\/33_series\/33.401\/33401-b10.zip"},{"key":"5_CR22","unstructured":"Wessel, S., Stumpf, F.: Page-based Runtime Integrity Protection of User and Kernel Code. In: Proceedings of EuroSec 2012, 5th European Workshop on System Security (April 2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:27:26Z","timestamp":1558301246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}