{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:57:25Z","timestamp":1725731845094},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388521"},{"type":"electronic","value":"9783642388538"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38853-8_31","type":"book-chapter","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T10:39:00Z","timestamp":1371119940000},"page":"343-352","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating the Impact of Integrating a Security Module on the Real-Time Properties of a System"],"prefix":"10.1007","author":[{"given":"Sunil","family":"Malipatlolla","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Stierand","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Anssi, S., Albers, K., D\u00f6rfel, M., G\u00e9rard, S.: chronVAL\/chronSIM: A Tool Suite for Timing Verification of Automotive Applications. In: Proc. Embedded Real-Time Software and Systems, ERTS (2012)"},{"key":"31_CR2","unstructured":"Autosar Organization: Specification\u00a0of\u00a0Crypto\u00a0Service\u00a0Manager (2011), \n                    \n                      http:\/\/www.autosar.org\/download\/R4.0\/AUTOSAR_SWS_CryptoServiceManager.pdf"},{"key":"31_CR3","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A Tutorial on Uppaal 2004-11-17. Tech. rep. Aalborg University, Denmark (November 2004)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Dierks, H., Metzner, A., Stierand, I.: Efficient Model-Checking for Real-Time Task Networks. In: International Conference on Embedded Software and Systems, ICESS (2009)","DOI":"10.1109\/ICESS.2009.26"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. Tech. rep. Stanford University, Stanford, CA, USA (1981)","DOI":"10.1109\/SFCS.1981.32"},{"issue":"1-3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11241-006-6884-x","volume":"33","author":"A. Hamann","year":"2006","unstructured":"Hamann, A., Jersak, M., Richter, K., Ernst, R.: A framework for modular analysis and exploration of heterogeneous embedded systems. Real-Time Systems\u00a033(1-3), 101\u2013137 (2006)","journal-title":"Real-Time Systems"},{"key":"31_CR7","unstructured":"Inc., X.: Xilinx, \n                    \n                      http:\/\/www.xilinx.com\/support\/documentation\/virtex-5.htm"},{"key":"31_CR8","unstructured":"Intel: Low Pin Count (LPC) Interface Specification. Intel Corp. (August 2002)"},{"issue":"1","key":"31_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TII.2009.2014055","volume":"5","author":"M. Lin","year":"2009","unstructured":"Lin, M., Xu, L., Yang, L., Qin, X., Zheng, N., Wu, Z., Qiu, M.: Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics\u00a05(1), 22\u201337 (2009)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"31_CR10","unstructured":"National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES) (2001)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Popp, T.: An Introduction to Implementation Attacks and Countermeasures. In: Proceedings of IEEE\/ACM International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2009), pp. 108\u2013115 (July 2009)","DOI":"10.1109\/MEMCOD.2009.5185386"},{"key":"31_CR12","unstructured":"Trusted Computing Group, Inc.: Trusted Platform Module (TPM) specifications (2010), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-31912-9_20","volume-title":"Information Security and Cryptology - ICISC 2011","author":"M. Wolf","year":"2012","unstructured":"Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) ICISC 2011. LNCS, vol.\u00a07259, pp. 302\u2013318. Springer, Heidelberg (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Embedded Systems: Design, Analysis and Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38853-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:46:54Z","timestamp":1557791214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38853-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388521","9783642388538"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38853-8_31","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}