{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:19:13Z","timestamp":1773195553349,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00063","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"546-550","source":"Crossref","is-referenced-by-count":0,"title":["Not Discrete Enough: On the Inherent Insecurity of dTPMs for Measured Boot"],"prefix":"10.1109","author":[{"given":"Christian","family":"Werling","sequence":"first","affiliation":[{"name":"TU Berlin,SecT,Berlin,Germany"}]},{"given":"Tahmid","family":"Zahin","sequence":"additional","affiliation":[{"name":"TU Berlin,Berlin,Germany"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"TU Berlin &#x0026; Fraunhofer SIT,SecT,Berlin,Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A Deep Dive into TPM-based BitLocker Drive Encryption","volume-title":"Tech. Rep.","author":"Labro","year":"2023"},{"key":"ref2","article-title":"TPM 2.0: A brief introduction","year":"2015"},{"key":"ref3","first-page":"1","article-title":"OSLO: Improving the security of Trusted Computing","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Kauer"},{"key":"ref4","article-title":"TCG PC Client Specific Platform Firmware Profile Specification"},{"key":"ref5","first-page":"2057","article-title":"TPM-FAIL: TPM meets timing and lattice attacks","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Moghimi"},{"key":"ref6","first-page":"1229","article-title":"A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Han"},{"key":"ref7","article-title":"Breaking BitLocker - Bypassing the Windows Disk Encryption","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00069"},{"key":"ref9","article-title":"TPMs Hate Him! (Some Weird Tricks To Break FDE and Bypass Attestation)","author":"Solutions","year":"2024"},{"key":"ref10","article-title":"TPM Security","volume-title":"Linux Kernel Documentation","year":"2024"},{"key":"ref11","article-title":"TPM 2.0 Library Specification, Part 1: Architecture","year":"2025"},{"key":"ref12","article-title":"TPM 2.0 Library Specification, Part 3: Commands","year":"2025"},{"key":"ref13","article-title":"CPU to TPM Bus Protection Guidance - Active Attack Mitigations","year":"2023"},{"key":"ref14","article-title":"CPU to TPM Bus Protection Guidance - Passive Attack Mitigation","year":"2023"},{"key":"ref15","first-page":"841","article-title":"fTPM: A Software-Only Implementation of a TPM Chip","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Raj"},{"key":"ref16","article-title":"Unified Extensible Firmware Interface (UEFI) Specification Version 6.6","author":"Forum","year":"2025"},{"key":"ref17","article-title":"How to Perform a BIOS or UEFI Reset and Clear CMOS on Dell Systems","author":"Technologies","year":"2025"},{"key":"ref18","article-title":"Bypassing BIOS Passwords on Modern Laptops: I2C Bus Analysis and Hardware Exploitation","author":"Team","year":"2023"},{"key":"ref19","article-title":"NVRAM Manipulation Vulnerabilities in UEFI DXE Phase: CVE-2025-3052 Analysis","author":"Team","year":"2025"},{"key":"ref20","article-title":"Finding LogoFAIL: The Dangers of Image Parsing During System Boot","author":"Team","year":"2023"},{"key":"ref21","article-title":"TCG Trusted Boot Chain in EDK II","year":"2021"},{"key":"ref22","article-title":"TCG PC Client Platform Firmware Profile Specification","author":"Group","year":"2023"},{"key":"ref23","article-title":"Saleae Logic Pro 16","year":"2024"},{"key":"ref24","article-title":"iCEstick Evaluation Kit","volume-title":"L. Semiconductor","year":"2024"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418012.pdf?arnumber=11418012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:33:18Z","timestamp":1773120798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00063","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}