{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:25:56Z","timestamp":1768422356332,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:00:00Z","timestamp":1674518400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:00:00Z","timestamp":1674518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"EU ECSEL"},{"name":"IRT Nanoelec"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In areas of activity where the notion of accountability is strong, the adoption of artificial intelligence (AI) is limited by the opacity and lack of understanding of its behavior, all the more so in the embedded domain where neural networks are compressed and executed on microcontrollers. While the NIST introduced in 2021 several principles allowing the AI explainability, this paper introduces a novel scheme, HistoTrust, combining secure hardware and blockchain technology to bring trust in the traceability of AI behavior and allow its explainability. HistoTrust attests in an Ethereum ledger all the relevant data produced by a physical device, especially the heuristics inferred by AI. Thus, the audition of the ledger allows security verifications and AI behavior analysis.<\/jats:p>","DOI":"10.1007\/s12243-022-00943-6","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T08:07:31Z","timestamp":1674547651000},"page":"413-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["HistoTrust: tracing AI behavior with secure hardware and blockchain technology"],"prefix":"10.1007","volume":"78","author":[{"given":"Dylan","family":"Paulin","sequence":"first","affiliation":[]},{"given":"Rapha\u00ebl","family":"Joud","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9170-6134","authenticated-orcid":false,"given":"Christine","family":"Hennebert","sequence":"additional","affiliation":[]},{"given":"Pierre-Alain","family":"Mo\u00ebllic","sequence":"additional","affiliation":[]},{"given":"Thibault","family":"Franco-Rondisson","sequence":"additional","affiliation":[]},{"given":"Romain","family":"Jayles","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,24]]},"reference":[{"key":"943_CR1","doi-asserted-by":"crossref","unstructured":"Jonathon Phillips P, Hahn C, Fontana P, Yates A, Greene KK, Broniatowski DA, Przybocki MA (2021) Four principles of explainable artificial intelligence, NIST Interagency\/Internal Report (NISTIR) - 8312","DOI":"10.6028\/NIST.IR.8312"},{"key":"943_CR2","doi-asserted-by":"crossref","unstructured":"Paulin D, Hennebert C, Franco-Rondisson T, Jayles R, Loubier T, Collado R (2021) HistoTrust: Ethereum-based attestation of a data history built with OP-TEE and TPM . In: Proceedings of the 14th international symposium on foundations & practice of security","DOI":"10.1007\/978-3-031-08147-7_9"},{"key":"943_CR3","unstructured":"Szil\u00e1gyi P (2021) EIP-225: Clique proof-of-authority consensus protocol, Ethereum Improvement Proposal. https:\/\/eips.ethereum.org\/EIPS\/eip-225"},{"key":"943_CR4","unstructured":"Hardjono T, Smith N (2020) An attestation architecture for Blockchain networks, arXiv:2005.04293 [cs.CR]"},{"key":"943_CR5","unstructured":"Chakraborty D, Hanzlik L, Bugiel S (2019) simTPM: User-centric TPM for Mobile Devices, Inproceedings of the 28th Conference USENIX Security Symposium, SSYM\u201919, USENIX Association, pp. 533-550, isbn: 978-1-939133-06-9"},{"key":"943_CR6","doi-asserted-by":"publisher","unstructured":"Hennebert C, Barrois F (2020) Is the blockchain a relevant technology for the industry 4.0?. In: Proceedings of the 2nd IEEE Conference on Blockchain Research & Applications for Innovative Networks and Services, BRAINS\u201920, pp. 212-216. IEEE Publisher. https:\/\/doi.org\/10.1109\/BRAINS49436.2020.9223290","DOI":"10.1109\/BRAINS49436.2020.9223290"},{"key":"943_CR7","doi-asserted-by":"publisher","unstructured":"Shepherd C, Akram R, Markantonakis K (2017) EmLog: tamper-resistant system logging for constrained devices with TEEs. In: Proceedings of the 11th IFIP international conference on information security theory and practice, WISTP\u201917, pp. 75\u201392, Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-319-93524-9_5https:\/\/doi.org\/10.1007\/978-3-319-93524-9_5","DOI":"10.1007\/978-3-319-93524-9_5 10.1007\/978-3-319-93524-9_5"},{"key":"943_CR8","doi-asserted-by":"publisher","unstructured":"Shepherd C, Arfaoui G, Gurulian I, Lee RP, Markantonakis K, Akram RN, Sauveron D, Conchon E (2016) Secure and trusted execution: past, present, and future - a critical review in the context of the internet of things and cyber-physical systems. In: Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA, pp 168\u2013177 IEEE Publisher. https:\/\/doi.org\/10.1109\/TrustCom.2016.0060","DOI":"10.1109\/TrustCom.2016.0060"},{"key":"943_CR9","unstructured":"Schneier B, Kelsey J (1998) Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th Conference on USENIX Security Symposium, Volume 7, SSYM\u201998 USENIX Association"},{"key":"943_CR10","doi-asserted-by":"crossref","unstructured":"Karande V, Bauman E, Lin Z, Khan L (2017) SGX-Log: Securing System Logs With SGX. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, ASIA CCS \u201917, pp. 19\u201330 ACM Publisher","DOI":"10.1145\/3052973.3053034"},{"key":"943_CR11","doi-asserted-by":"publisher","unstructured":"Shekhtman L, Waisbard E (2019) Engravechain: Tamper-proof distributed log system. In: Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, BlockSys\u201919 ACM Publisher. https:\/\/doi.org\/10.1145\/3362744.3363346","DOI":"10.1145\/3362744.3363346"},{"key":"943_CR12","doi-asserted-by":"publisher","unstructured":"Javaid U, Aman MN, Sikdar B (2018) BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments. In: The 1st Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys\u201918, ACM Publisher, https:\/\/doi.org\/10.1145\/3282278.3282281https:\/\/doi.org\/10.1145\/3282278.3282281","DOI":"10.1145\/3282278.3282281 10.1145\/3282278.3282281"},{"key":"943_CR13","doi-asserted-by":"publisher","unstructured":"Elsts A, Mitskas E, Oikonomou G (2018) Distributed Ledger Technology and the Internet of Things: A Feasibility Study. In: The 1st Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys\u201918, ACM Publisher, 2018. https:\/\/doi.org\/10.1145\/3282278.3282280https:\/\/doi.org\/10.1145\/3282278.3282280","DOI":"10.1145\/3282278.3282280 10.1145\/3282278.3282280"},{"key":"943_CR14","unstructured":"Trusted Computing Group (2019) TCG Trusted Attestation Protocol (TAP) Use Cases for TPM Families 1.2 and 2.0 and DICE. Version 1.0, Revision 0.35"},{"key":"943_CR15","doi-asserted-by":"publisher","unstructured":"Coker G, Guttman J, Loscocco P, Herzog A, Millen J, O\u2019Hanlon B, Ramsdell J, Segall A, Sheehy J, Sniffen B (2011) Principles of remote attestation, vol 10, pp 63\u201381, DOI Springer. https:\/\/doi.org\/10.1007\/s10207-011-0124-7","DOI":"10.1007\/s10207-011-0124-7"},{"key":"943_CR16","unstructured":"Yang K, Chen L, Zhang Z, Newton CJP, Yang B, Xi L (2018) Direct Anonymous Attestation with Optimal TPM Signing Efficiency, eprint 1128"},{"issue":"3","key":"943_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/JPROC.2021.3060483","volume":"109","author":"W Samek","year":"2021","unstructured":"Samek W, Montavon G, Lapuschkin S, Anders CJ, M\u00fcller KR (2021) Explaining deep neural networks and beyond: A review of methods and applications. Proc IEEE 109(3):247\u2013278","journal-title":"Proc IEEE"},{"issue":"4","key":"943_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun Y, et al (1989) Backpropagation Applied to Handwritten Zip Code Recognition. Neural Comput 1(4):541\u2013551. https:\/\/doi.org\/10.1162\/neco.1989.1.4.541","journal-title":"Neural Comput"},{"key":"943_CR19","unstructured":"Mishra R, Gupta HP, Dutta T (2020) A survey on deep neural network compression: Challenges, overview, and solutions. arXiv:2010.03954"},{"key":"943_CR20","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Zheng X (2016) TensorFlow: A System for Large-Scale Machine Learning. In: 12th USENIX symposium on operating systems design and implementation (OSDI 16), pp 265\u2013283"},{"key":"943_CR21","unstructured":"STMicroelectronics (2021) Linux RPMsg framework overview. https:\/\/wiki.st.com\/stm32mpu\/wiki\/Linux_RPMsg_framework_overviewhttps:\/\/wiki.st.com\/stm32mpu\/wiki\/Linux_RPMsg_framework_overview"},{"key":"943_CR22","unstructured":"STMicroelectronics (2021) STM32MP15ROM code secure boot. https:\/\/wiki.st.com\/stm32mpu\/wiki\/STM32_MPU_ROM_code_secure_boot"},{"key":"943_CR23","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1098\/rstb.1990.0090","volume":"327","author":"J Reason","year":"1990","unstructured":"Reason J (1990) The contribution of latent human failures to the breakdown of complex systems. Philosophical Transactions of the Royal Society of London, Series B, Biological Sciences, n\u22181241 327:475\u2013484. https:\/\/doi.org\/10.1098\/rstb.1990.0090","journal-title":"Philosophical Transactions of the Royal Society of London, Series B, Biological Sciences, n\u22181241"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-022-00943-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-022-00943-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-022-00943-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T02:04:45Z","timestamp":1693879485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-022-00943-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,24]]},"references-count":23,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["943"],"URL":"https:\/\/doi.org\/10.1007\/s12243-022-00943-6","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,24]]},"assertion":[{"value":"17 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}}]}}