{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T14:45:03Z","timestamp":1758120303721,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/host45689.2020.9300257","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:19:40Z","timestamp":1608934780000},"page":"305-315","source":"Crossref","is-referenced-by-count":5,"title":["LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells"],"prefix":"10.1109","author":[{"given":"Orlando","family":"Arias","sequence":"first","affiliation":[]},{"given":"Dean","family":"Sullivan","sequence":"additional","affiliation":[]},{"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0550"},{"key":"ref15","article-title":"Beebs: Open benchmarks for energy measurements on embedded platforms","author":"pallister","year":"2013","journal-title":"arXiv preprint arXiv 1308 5174"},{"journal-title":"GNU Cflow","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref18","first-page":"636","article-title":"Network applications of bloom filters: A survey","author":"broder","year":"2002","journal-title":"Internet Mathematics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0873"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607177"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0107216"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342055"},{"journal-title":"Hardblare a hardware-assisted approach for dynamic information flow tracking","year":"2016","author":"allah","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"volume":"v1 12 1","journal-title":"Zynq-7000 All Programmable SoC Technical Reference Manual","year":"2017","key":"ref8"},{"journal-title":"CoreSight Technology System Design Guide","year":"2010","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"journal-title":"Modern game console exploitation","year":"2012","author":"debusschere","key":"ref9"},{"key":"ref1","first-page":"1","article-title":"Smart: Secure and minimal architecture for (establishing dynamic) root of trust","volume":"12","author":"eldefrawy","year":"2012","journal-title":"NDSS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1966.1053907"},{"key":"ref22","first-page":"161","article-title":"Controlflow bending: On the effectiveness of control-flow integrity","author":"carlini","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090789"},{"journal-title":"Integrated Logic Analyzer (ILA)","year":"0","key":"ref24"},{"journal-title":"Cortex-A9 Revision r3p0 Technical Reference Manual","year":"2011","key":"ref23"},{"journal-title":"ARMv8-M Architecture Reference Manual","year":"2017","key":"ref26"},{"journal-title":"DesignSart &#x2013; ARM Developer","year":"2019","key":"ref25"}],"event":{"name":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2020,12,7]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9300124\/9300255\/09300257.pdf?arnumber=9300257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:56:03Z","timestamp":1656345363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9300257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/host45689.2020.9300257","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}