{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:26:52Z","timestamp":1761708412693},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270348","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T14:41:36Z","timestamp":1254321696000},"page":"115-124","source":"Crossref","is-referenced-by-count":94,"title":["Remote attestation to dynamic system properties: Towards providing complete system integrity evidence"],"prefix":"10.1109","author":[{"given":"Chongkyung","family":"Kil","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emre C.","family":"Sezer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed M.","family":"Azab","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaolan","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","article-title":"trusted platform on demand (tpod)","author":"maruyama","year":"0","journal-title":"Research Report"},{"journal-title":"Performance Enhancements for a Dynamic Invariant Detector","year":"2007","author":"xiao","key":"35"},{"key":"17","article-title":"accurate and automated system call policy-based intrusion prevention","author":"lam","year":"2006","journal-title":"Proceedings of the International Conference on Dependable Systems and Networks"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"15","article-title":"client puzzles: a cryptographic defense against connection depletion","author":"juels","year":"1999","journal-title":"Proc Network and Distributed System Security Symp (NDSS 99)"},{"article-title":"a security assessment of trusted platform modules. dartmouth university","year":"2007","author":"sparks","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.19"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179481"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240294"},{"key":"11","first-page":"189","article-title":"software integrity protection using timed executable agents","author":"garay","year":"2006","journal-title":"Proceedings of ACM Symposium on Information Computer and Communications Security (ASIACCS'06)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086306"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"24","first-page":"179","article-title":"copilot- a coprocessor-based kernel runtime integrity monitor","author":"petroni jr","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"26","article-title":"design and implementation of a tcg-based integrity measurement architecture","author":"sailer","year":"2004","journal-title":"13th USENIX Security Symposium"},{"journal-title":"Symantec VERITAS Multiple Buffer Overflows","year":"0","key":"27"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"journal-title":"Apache benchmarking tool","year":"2008","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"7","article-title":"mayday: distributed filtering for internet services","author":"andersen","year":"2003","journal-title":"Proc 4th USENIX Symp Internet Technologies and Systems (USITS 03)"},{"journal-title":"The open-source TCG Software Stack","year":"0","key":"6"},{"key":"32","doi-asserted-by":"crossref","DOI":"10.1007\/11601494_3","article-title":"remote software-based attestation for wireless sensors","author":"shaneck","year":"2005","journal-title":"Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"journal-title":"System","year":"0","key":"5"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315313","article-title":"the geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security (CCS '07)"},{"journal-title":"Ruby Programming Language","year":"0","key":"4"},{"key":"9","article-title":"stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179479"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270348.pdf?arnumber=5270348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:17:18Z","timestamp":1497817038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270348","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}