{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T22:11:36Z","timestamp":1685743896732},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,8,17]],"date-time":"2010-08-17T00:00:00Z","timestamp":1282003200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11227-010-0465-4","type":"journal-article","created":{"date-parts":[[2010,8,16]],"date-time":"2010-08-16T11:52:37Z","timestamp":1281959557000},"page":"676-692","source":"Crossref","is-referenced-by-count":2,"title":["Efficient scheme of verifying integrity of application binaries in embedded operating systems"],"prefix":"10.1007","volume":"59","author":[{"given":"Soon Seok","family":"Kim","sequence":"first","affiliation":[]},{"given":"Deok Gyu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,17]]},"reference":[{"key":"465_CR1","doi-asserted-by":"crossref","unstructured":"Abuhmed T, Nyamaa N, Nyang D (2009) Software-based remote code attestation in wireless sensor network. In: Proc IEEE GLOBECOM","DOI":"10.1109\/GLOCOM.2009.5425280"},{"key":"465_CR2","doi-asserted-by":"crossref","unstructured":"Arbaugh A, Farber DJ, Smith JM (1997) A secure and reliable BootStrap architecture. In: Proc IEEE symposium on security and privacy, pp\u00a065\u201371","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"465_CR3","doi-asserted-by":"crossref","unstructured":"Castelluccia C, Francillon A, Perito D, Soriente C (2009) On the difficulty of software-based attestation of embedded devices. In: Proc the 16th ACM conference on computer and communications security (CCS)","DOI":"10.1145\/1653662.1653711"},{"key":"465_CR4","unstructured":"Chen Y, Venkatesan R, Cary M, Sinha S, Jakubowski MH (2002) Oblivious hashing: a stealthy software integrity verification primitive. In: Proc int workshop, information hiding, pp\u00a0400\u2013414"},{"key":"465_CR5","doi-asserted-by":"crossref","unstructured":"Chhabra S, Rogers B, Solihin Y, Prvulovic M (2009) Making secure processors OS- and performance-friendly. ACM Trans Archit Code Optim (TACO) 5(4)","DOI":"10.1145\/1498690.1498691"},{"key":"465_CR6","doi-asserted-by":"crossref","unstructured":"Ceccato M Preda, MD, Majumdar, A, Tonella, P (2009) Remote software protection by orthogonal client replacement. In: Proc the 24th ACM symposium on applied computing, ACM","DOI":"10.1145\/1529282.1529380"},{"key":"465_CR7","unstructured":"Common Vulnerabilities and Exposures (2010) http:\/\/cve.mitre.org\/"},{"key":"465_CR8","unstructured":"Courtright K Husain, MI, Sridhar, R (2009) LASE: latency aware simple encryption for embedded systems security. Int J Comput Sci Netw Secur (IJCSNS), 9(10)"},{"key":"465_CR9","unstructured":"CryptocellTM, Discretix Technologies Ltd. http:\/\/www.discretix.com"},{"key":"465_CR10","unstructured":"Giannetsosl T, Dimitrioul T, Krontiris I, Prasad, NR (2010) Arbitrary Code Injection through Self-propagating Worms in Von. Neumann, Architecture Devices. Comput J Adv Access. Published online. http:\/\/comjnl.oxfordjournals.org\/cgi\/content\/abstract\/bxq009"},{"key":"465_CR11","unstructured":"Gilani S (2007) Embedded OS: a foundation for secure networking. In: Embedded computer design. OpenSystems publishing. http:\/\/www.mentor.com"},{"key":"465_CR12","doi-asserted-by":"crossref","unstructured":"Gilbert H, Handschuh H (2005) Security analysis of SHA-256 and sisters. In: Selected areas in cryptography 2003, NIST cryptographic hash workshop","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"465_CR13","doi-asserted-by":"crossref","unstructured":"Gogniat G, Wolf T, Burleson W (2005) Reconfigurable security primitive for embedded systems. In: Proc international symposium on system-on-chip (SOC)","DOI":"10.1109\/ISSOC.2005.1595635"},{"key":"465_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/359205.359227","volume":"44","author":"AK Ghosh","year":"2001","unstructured":"Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Commun ACM 44:51\u201357","journal-title":"Commun ACM"},{"key":"465_CR15","unstructured":"Henderson B (2010) Linux Loadable Kernel Module HOWTO. http:\/\/www.linux.org\/docs\/ldp\/howto\/module-howto\/"},{"key":"465_CR16","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic number theory (ANTS III)","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein J, Pipher J, Silverman J (1998) NTRU: a ring-based public key cryptosystem. In: Buhler J (ed) Algorithmic number theory (ANTS III). LNCS, vol\u00a01423. Springer, Berlin, pp\u00a0267\u2013288"},{"issue":"2","key":"465_CR17","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2006.51","volume":"4","author":"DD Hwang","year":"2006","unstructured":"Hwang DD, Schaumont P, Tiri K, Verbauwhede I (2006) Securing embedded systems. IEEE Secur Priv 4(2):40\u201349","journal-title":"IEEE Secur Priv"},{"key":"465_CR18","unstructured":"Jones K (2001) Loadable kernel modules. http:\/\/www.usenix.org\/publications\/login\/2001-11\/pdfs\/jones2.pdf"},{"key":"465_CR19","unstructured":"Jung YJ, Lim DH, Seo YB, Kim JM (2008) The trends of embedded operating system security technology online publishing. http:\/\/ettrends.etri.re.kr\/PDFData\/23-1_001_011.pdf , ETRI (in Korean)"},{"key":"465_CR20","doi-asserted-by":"crossref","unstructured":"Kil C, Sezer EC, Azab AM, Ning, P, Zhang X (2009) Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: Proc the 39th IEEE\/IFIP conference on dependable systems and networks","DOI":"10.1109\/DSN.2009.5270348"},{"key":"465_CR21","doi-asserted-by":"crossref","unstructured":"Kocher P, Lee R, McGraw G, Raghunathan A, Ravi S (2004) Security as a new dimension in embedded system design. In: Proc the 41st IEEE design automation conference, pp 753\u2013760","DOI":"10.1145\/996566.996771"},{"key":"465_CR22","unstructured":"Latest Virus Threats (2010) Symantec Corporation. http:\/\/www.symantec.com\/avcenter\/vinfodb.html"},{"key":"465_CR23","series-title":"LNCS","first-page":"346","volume-title":"Buffer cache level encryption for embedded secure operating system","author":"J Lee","year":"2007","unstructured":"Lee J, Heo J, Park J, Cho Y, Hong J, Park M (2007) Buffer cache level encryption for embedded secure operating system. In: LNCS, vol\u00a04808. Springer, Berlin, pp 346\u2013355"},{"key":"465_CR24","unstructured":"Lee JS, Jung KY, Jung D, Kim TH, Kim Y, Kim J (2008) Preventing ELF-file-infecting malware using signature verification for embedded Linux. J KIISE Comput Pract Lett 14(6) (in Korean)"},{"key":"465_CR25","series-title":"LNCS","volume-title":"Proc Crypto 2000","author":"AK Lenstra","year":"2000","unstructured":"Lenstra AK, Verheul ER (2000) The XTR public key system. In: Proc Crypto 2000. LNCS, vol\u00a01880. Springer, Berlin"},{"key":"465_CR26","doi-asserted-by":"crossref","unstructured":"Lie D, Thekkath CA, Mitchell M, Lincoln P, Boneh D, Mitchell JC, Horowitz M (2000) Architectural Support for Copy and Tamper resistant software. In: Proc ACM architectural support for programming languages and operating systems (ASPLOS), pp\u00a0168\u2013177","DOI":"10.21236\/ADA419599"},{"key":"465_CR27","doi-asserted-by":"crossref","unstructured":"Liu D, Dong Q (2009) Combating side-channel attacks using key management. In: IEEE international symposium on parallel & distributed processing, pp\u00a01\u20138","DOI":"10.1109\/IPDPS.2009.5161248"},{"issue":"6","key":"465_CR28","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TC.2010.32","volume":"59","author":"S Mao","year":"2010","unstructured":"Mao S, Wolf T (2010) Hardware support for secure processing in embedded systems. IEEE Trans Comput 59(6):847\u2013854","journal-title":"IEEE Trans Comput"},{"key":"465_CR29","doi-asserted-by":"crossref","unstructured":"Muthukumaran D, Sawani A, Schiffman J, Jung BM, Jaeger T (2008) Measuring integrity on mobile phone systems. In: Proc the 13th ACM symposium on access control models and technologies","DOI":"10.1145\/1377836.1377862"},{"key":"465_CR30","unstructured":"Next-Generation Secure Computing Base (NGSCB) (2003) http:\/\/www.microsoft.com\/resources\/ngscb\/default.mspx"},{"key":"465_CR31","unstructured":"Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Technical Report LCS\/TR-212. Massachusetts Institute of Technology"},{"key":"465_CR32","doi-asserted-by":"crossref","unstructured":"Ravi S, Raghunathan A, Chakradhar S (2004) Tamper resistance mechanisms for secure embedded systems. In: Proc the international conference on VLSI Design, pp 605\u2013611","DOI":"10.1109\/ICVD.2004.1260985"},{"key":"465_CR33","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S Ravi","year":"2004","unstructured":"Ravi S, Raghunathan A, Kocher P, Hattangady S (2004) Security in embedded systems: design challenges. ACM Trans Embed Comput Syst 3:461\u2013491","journal-title":"ACM Trans Embed Comput Syst"},{"key":"465_CR34","doi-asserted-by":"crossref","unstructured":"Schellekens D, Wyseur B, Preneel B (2008) Remote attestation on legacy operating systems with trusted platform modules. In: Sci Comput Program, pp 13\u201322","DOI":"10.1016\/j.scico.2008.09.005"},{"key":"465_CR35","unstructured":"Secure Coprocessing (2010) IBM Inc. http:\/\/www.research.ibm.com\/scop\/"},{"key":"465_CR36","unstructured":"Security Reference Model for Embedded Operating System (2006) TTAS.KO-11.0054. Telecommunications Technology Association. http:\/\/www.tta.or.kr\/ (in Korean)"},{"key":"465_CR37","doi-asserted-by":"crossref","unstructured":"Seshadri A, Luk M, Shi E, Perrig A, Doorn L, Khosla P (2005) Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms. In: Proc the symposium on operating systems principals","DOI":"10.1145\/1095810.1095812"},{"key":"465_CR38","unstructured":"Seshadri A, Perrig A, Doorn L, Khosla P (2004) SWATT: software-based ATTestation for embedded devices. In: Proc the IEEE symposium on security and privacy"},{"key":"465_CR39","doi-asserted-by":"crossref","unstructured":"Suh GE, Clarke D, Gassend B, Dijk M, Devadas S (2003) AEGIS: architecture for tamper-evident and Tamper-resistant processing. In: Proc intl conf. supercomputing (ICS \u201903), pp\u00a0160\u2013171","DOI":"10.1145\/782814.782838"},{"key":"465_CR40","doi-asserted-by":"crossref","unstructured":"Suh GE, Clarke D, Gassend B, Dijk M, Devadas S (2003) Efficient memory integrity verification and encryption for secure processors. In: Proc MICRO-36","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"465_CR41","unstructured":"The IBM PCI Cryptographic Coprocessor (2010) IBM Inc. http:\/\/www3.ibm.com\/security\/cryptocards\/"},{"key":"465_CR42","unstructured":"The National Security Agency (2003) Security-enhanced Linux. http:\/\/www.nsa.gov\/research\/selinux\/"},{"key":"465_CR43","unstructured":"TinyECC (2007) A Configurable Library for Elliptic Curve Cryptography in Wiress Sensor Networks Ver 1.0. http\/\/discovery.csc.ncsu.edu\/software\/TinyECC"},{"key":"465_CR44","unstructured":"Trusted Computing Group (TCG) (2003) https:\/\/www.trustedcomputinggroup.org\/"},{"issue":"1","key":"465_CR45","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.micpro.2008.08.008","volume":"33","author":"R Vaslin","year":"2009","unstructured":"Vaslin R, Gogniat G, Diguet J, Wanderley E, Tessier R, Burleson W (2009) A security approach for off-chip memory in embedded microprocessor systems. Microprocess Microsyst 33(1):37\u201345","journal-title":"Microprocess Microsyst"},{"key":"465_CR46","unstructured":"Virus Information (2010) Computer Security Resource Center. National Institute of Standards and Technology. http:\/\/csrc.nist.gov\/virus\/"},{"key":"465_CR47","unstructured":"Vulnerability notes database (2010) CERT coordination center. http:\/\/www.kb.cert.org\/vuls\/"},{"key":"465_CR48","doi-asserted-by":"crossref","unstructured":"Wang X, Yin, Y, Yu H (2005) Finding collisions in the full SHA-1. In: Proc Crypto","DOI":"10.1007\/11535218_2"},{"key":"465_CR49","unstructured":"Welsh M (1995) Implementing Loadable Kernel Modules for Linux. Dr Dobbs J 20(5)"},{"key":"465_CR50","unstructured":"WireX Communications (2001) Linux Security Module. http:\/\/lsm.immunix.org\/"},{"key":"465_CR51","unstructured":"Wright C, Cowan C, Smalley S, Morris J, Hartman GK (2002) Linux Security Module framework. In: 2002 Ottawa Linux symposium"},{"key":"465_CR52","unstructured":"Yee B (1994) Using secure co-processors. PhD thesis, Carnegie Mellon University"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0465-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0465-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0465-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:30:07Z","timestamp":1685741407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0465-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,17]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0465-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,17]]}}}