{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:39:06Z","timestamp":1765438746402,"version":"build-2065373602"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527978","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"73-80","source":"Crossref","is-referenced-by-count":7,"title":["ERAMO: Effective Remote Attestation through Memory Offloading"],"prefix":"10.1109","author":[{"given":"Jeppe Hagelskjar","family":"Ostergaard","sequence":"first","affiliation":[]},{"given":"Edlira","family":"Dushku","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3008879"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9"},{"key":"ref35","article-title":"Temporal consistency of integrity-ensuring computations and applications to embedded systems security","author":"eldefrawy","year":"2018","journal-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS)"},{"key":"ref34","article-title":"Sha-1 is a shambles: First chosen-prefix collision on sha-1 and application to the PGP web of trust","author":"leurent","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095812"},{"key":"ref14","article-title":"SMART: Secure and minimal architecture for (establishing a dynamic) root of trust","author":"eldefrawy","year":"2012","journal-title":"The Network and Distributed System Security Symposium (NDSS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383885"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947652"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342195"},{"year":"2017","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref2","first-page":"129","article-title":"The Internet of hack-able things","author":"dragoni","year":"2017","journal-title":"Proceedings of 5th International Conference in Software Engineering for Defence Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"year":"2020","key":"ref1","article-title":"State of the IoT 2020: 12 billion IoT connections, surpassing non-IoT for the first time"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983282"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.3390\/s21051598","article-title":"State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things","volume":"21","author":"ankerg\u00e5rd","year":"2021","journal-title":"SENSORS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref25","article-title":"Design and implementation of a tcg-based integrity measurement architecture","author":"sailer","year":"2004","journal-title":"13th USENIX Security Symposium"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2021,7,26]]},"location":"Rhodes, Greece","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527978.pdf?arnumber=9527978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:43Z","timestamp":1652197543000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527978","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}