{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:27:37Z","timestamp":1725755257130},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417160"},{"type":"electronic","value":"9783642417177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41717-7_12","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T06:40:29Z","timestamp":1383633629000},"page":"94-114","source":"Crossref","is-referenced-by-count":4,"title":["ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets"],"prefix":"10.1007","author":[{"given":"Jun","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]},{"given":"James","family":"Newsome","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Armknecht, F., Sadeghi, A.-R., Schulz, S., Wachsmann, C.: A Security Framework for Analysis and Design of Software Attestation. In: Cryptology ePrint Archive: Report 2013\/083 (February 18, 2013)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of ACM Conference on Computer and Communication Security (CCS), pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Kovah, X., Kallenberg, C., Weathers, C., Herzog, A., Albin, M., Butterworth, J.: New results for timing-based attestation. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2012)","DOI":"10.1109\/SP.2012.45"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13869-0_2","volume-title":"Trust and Trustworthy Computing","author":"Y. Li","year":"2010","unstructured":"Li, Y., McCune, J.M., Perrig, A.: SBAP: Software-based attestation for peripherals. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 16\u201329. Springer, Heidelberg (2010)"},{"key":"12_CR5","unstructured":"Pappu, R.: Physical One-Way Functions. PhD thesis, MIT School of Architecture and Planning, Program in Media Arts and Sciences (March 2001)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: SCUBA: Secure code update by attestation in sensor networks. In: Proceedings of ACM Workshop on Wireless Security, WiSe (September 2006)","DOI":"10.1145\/1161289.1161306"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In: Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pp. 1\u201316 (October 2005)","DOI":"10.1145\/1095810.1095812"},{"key":"12_CR8","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: Software-based attestation for embedded devices. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11601494_3","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"M. Shaneck","year":"2005","unstructured":"Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"12_CR10","unstructured":"Tran, A.: DABLS: Device attestation with bounded leakage of secrets. Master\u2019s thesis, Carnegie Mellon University (July 2011), \n                  \n                    http:\/\/www.cylab.cmu.edu\/files\/pdfs\/tech_reports\/CMUCyLab13009.pdf"},{"key":"12_CR11","unstructured":"Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 103 (July 2007)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41717-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T02:50:31Z","timestamp":1558666231000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41717-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417160","9783642417177"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41717-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}