{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:17:27Z","timestamp":1774369047107,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Hewlett Packard Enterprise"},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"crossref","award":["0001"],"award-info":[{"award-number":["0001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"crossref","award":["0001"],"award-info":[{"award-number":["0001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"crossref","award":["0001"],"award-info":[{"award-number":["0001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"crossref","award":["2020\/09850-0"],"award-info":[{"award-number":["2020\/09850-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"crossref","award":["304643\/2020-3"],"award-info":[{"award-number":["304643\/2020-3"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01034-y","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T05:42:30Z","timestamp":1746682950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Benchmarking the security protocol and data model (SPDM) for component authentication"],"prefix":"10.1007","volume":"24","author":[{"given":"Renan C. A.","family":"Alves","sequence":"first","affiliation":[]},{"given":"Bruno C.","family":"Albertini","sequence":"additional","affiliation":[]},{"given":"Marcos A.","family":"Simplicio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"key":"1034_CR1","unstructured":"Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: Network and Distributed System Security Symposium (NDSS\u201913), p. 13. The Internet Society, San Diego, California (2013)"},{"key":"1034_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102149","volume":"102","author":"D Brown","year":"2021","unstructured":"Brown, D., Walker, T., III., Blanco, J., Ives, R., Ngo, H., Shey, J., Rakvic, R.: Detecting firmware modification on solid state drives via current draw analysis. Comput. Secur. 102, 102149 (2021)","journal-title":"Comput. Secur."},{"issue":"1","key":"1034_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TCE.2016.7448561","volume":"62","author":"B-C Choi","year":"2016","unstructured":"Choi, B.-C., Lee, S.-H., Na, J.-C., Lee, J.-H.: Secure firmware validation and update for consumer devices in home networking. IEEE Trans. Consum. Electron. 62(1), 39\u201344 (2016). https:\/\/doi.org\/10.1109\/TCE.2016.7448561","journal-title":"IEEE Trans. Consum. Electron."},{"key":"1034_CR4","unstructured":"Menn, J.: NSA Can Hide Spyware in Hard-Disk Firmware. https:\/\/www.vox.com\/2015\/2\/17\/11559082\/nsa-can-hide-spyware-in-hard-disk-firmware. Accessed 16 Dec 2021 (2015)"},{"key":"1034_CR5","unstructured":"DMTF: DSP0274: Security protocol and data model (SPDM) specification, v.1.3.0. Technical report, Distributed Management Task Force (Jun 2023). www.dmtf.org\/sites\/default\/files\/standards\/documents\/DSP0274_1.3.0.pdf"},{"issue":"4","key":"1034_CR6","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MITP.2024.3396356","volume":"26","author":"A Armellin","year":"2024","unstructured":"Armellin, A., Caviglia, R., Gaggero, G., Marchese, M.: A framework for the deployment of cybersecurity monitoring tools in the industrial environment. IT Professional 26(4), 62\u201370 (2024). https:\/\/doi.org\/10.1109\/MITP.2024.3396356","journal-title":"IT Professional"},{"key":"1034_CR7","unstructured":"Cremers, C., Dax, A., Naska, A.: Formal analysis of SPDM: Security protocol and data model version 1.2. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 6611\u20136628 (2023)"},{"key":"1034_CR8","doi-asserted-by":"publisher","unstructured":"Profentzas, C., G\u00fcnes, M., Nikolakopoulos, Y., Landsiedel, O., Almgren, M.: Performance of secure boot in embedded systems. In: 15th DCOSS, pp. 198\u2013204 (2019). https:\/\/doi.org\/10.1109\/DCOSS.2019.00054","DOI":"10.1109\/DCOSS.2019.00054"},{"key":"1034_CR9","doi-asserted-by":"publisher","unstructured":"Khalid, O., Rolfes, C., Ibing, A.: On implementing trusted boot for embedded systems. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 75\u201380 (2013). https:\/\/doi.org\/10.1109\/HST.2013.6581569","DOI":"10.1109\/HST.2013.6581569"},{"key":"1034_CR10","doi-asserted-by":"publisher","unstructured":"Yin, H., Dai, H., Jia, Z.: Verification-based multi-backup firmware architecture, an assurance of trusted boot process for the embedded systems. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1188\u20131195 (2011). https:\/\/doi.org\/10.1109\/TrustCom.2011.160","DOI":"10.1109\/TrustCom.2011.160"},{"key":"1034_CR11","doi-asserted-by":"publisher","unstructured":"Kumar, V.B.Y., Gupta, N., Chattopadhyay, A., Kasper, M., Krau\u00df, C., Niederhagen, R.: Post-quantum secure boot. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1582\u20131585 (2020). https:\/\/doi.org\/10.23919\/DATE48585.2020.9116252","DOI":"10.23919\/DATE48585.2020.9116252"},{"key":"1034_CR12","doi-asserted-by":"publisher","unstructured":"Dasari, S., Madipadga, V.: Aegis: A framework to detect compromised components in the supply chain of information technology infrastructure. In: IWBIS, pp. 159\u2013164 (2020). https:\/\/doi.org\/10.1109\/IWBIS50925.2020.9255660","DOI":"10.1109\/IWBIS50925.2020.9255660"},{"key":"1034_CR13","doi-asserted-by":"publisher","unstructured":"Velozo, F., Ferreira, T., Pacheco, E., Alves, R., Jr., M.S., Albertini, B., Batista, D.: Fuzzing para o protocolo TLS: Estado da arte e compara\u00e7\u00e3o de fuzzers existentes. In: XXIII SBSeg, pp. 303\u2013308. SBC, Porto Alegre, RS, Brasil (2023). https:\/\/doi.org\/10.5753\/sbseg_estendido.2023.235133","DOI":"10.5753\/sbseg_estendido.2023.235133"},{"key":"1034_CR14","doi-asserted-by":"crossref","unstructured":"Ferreira, T.D., Freitas, O.F., Alves, R.C.A., Albertini, B.C., Jr., M.A.S., Batista, D.M.: SPDM-WiD: Uma ferramenta para inspe\u00e7\u00e3o de pacotes do security protocol data model (SPDM). In: XLII SBRC, p. 8. SBC, Porto Alegre, RS, Brasil (2024)","DOI":"10.5753\/sbrc_estendido.2024.3175"},{"key":"1034_CR15","doi-asserted-by":"crossref","unstructured":"Fujimoto, A., Peterson, P., Reiher, P.: Comparing the power of full disk encryption alternatives. In: 2012 International Green Computing Conference (IGCC), pp. 1\u20136 (2012). IEEE","DOI":"10.1109\/IGCC.2012.6322245"},{"key":"1034_CR16","doi-asserted-by":"crossref","unstructured":"Bro\u017e, M., Pato\u010dka, M., Maty\u00e1\u0161, V.: Practical cryptographic data integrity protection with full disk encryption. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 79\u201393 (2018). Springer","DOI":"10.1007\/978-3-319-99828-2_6"},{"key":"1034_CR17","unstructured":"Petschick, M.: Full disk encryption on unmanaged flash devices. Master\u2019s thesis, Technische Universit\u00e4t Berlin, Germany (2011)"},{"key":"1034_CR18","unstructured":"Bosen, B.: Full drive encryption with Samsung solid state drives. Technical report, Trusted Strategies LLC (2010)"},{"key":"1034_CR19","unstructured":"Bosen, B.: FDE performance comparison - hardware versus software full drive encryption. Technical report, Trusted Strategies LLC (2010)"},{"issue":"10","key":"1034_CR20","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1002\/sec.1028","volume":"8","author":"R Mayrhofer","year":"2015","unstructured":"Mayrhofer, R.: An architecture for secure mobile devices. Secur. Commun. Netw. 8(10), 1958\u20131970 (2015). https:\/\/doi.org\/10.1002\/sec.1028","journal-title":"Secur. Commun. Netw."},{"key":"1034_CR21","doi-asserted-by":"publisher","unstructured":"Alves, R.C.A., Albertini, B.C., Simplicio, M.A.: Securing hard drives with the security protocol and data model (spdm). In: 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 446\u2013447 (2022). https:\/\/doi.org\/10.1109\/ISVLSI54635.2022.00099","DOI":"10.1109\/ISVLSI54635.2022.00099"},{"key":"1034_CR22","unstructured":"Alves, R.C.A., Jr., M.A.S., Albertini, B.C.: Adapting a network card and a hard drive to SPDM. GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022)"},{"key":"1034_CR23","unstructured":"QEMU: QEMU - A generic and open source machine emulator and virtualizer. https:\/\/www.qemu.org\/"},{"key":"1034_CR24","doi-asserted-by":"publisher","unstructured":"Kukunas, J.: Chapter 8 - perf. In: Power and Performance, pp. 137\u2013165. Morgan Kaufmann, Boston (2015). https:\/\/doi.org\/10.1016\/B978-0-12-800726-6.00008-2","DOI":"10.1016\/B978-0-12-800726-6.00008-2"},{"key":"1034_CR25","unstructured":"DMTF: libspdm is a sample implementation that follows the DMTF SPDM specification. https:\/\/github.com\/DMTF\/libspdm\/"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01034-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01034-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01034-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:34Z","timestamp":1750500694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01034-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1034"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01034-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"8 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"126"}}