{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:10:57Z","timestamp":1767773457782,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/hpec.2015.7322461","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T23:12:34Z","timestamp":1447369954000},"page":"1-5","source":"Crossref","is-referenced-by-count":19,"title":["Secure architecture for embedded systems"],"prefix":"10.1109","author":[{"given":"Michael","family":"Vai","sequence":"first","affiliation":[]},{"given":"Ben","family":"Nahill","sequence":"additional","affiliation":[]},{"given":"Josh","family":"Kramer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Geis","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Utin","sequence":"additional","affiliation":[]},{"given":"David","family":"Whelihan","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Khazan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"How to Use the TPM A Guide to Hardware-Based Endpoint Security","year":"2015","key":"ref4"},{"journal-title":"Special Publication 800&#x2013;22","year":"2011","key":"ref3"},{"journal-title":"NSA Suite B Cryptography","year":"2015","key":"ref6"},{"journal-title":"Deconstructing a &#x2018;secure&#x2019; processor","year":"2015","key":"ref5"},{"key":"ref8","article-title":"Robust Keys from Physical Unclonahle Functions","author":"spain","year":"2014","journal-title":"IEEE International Symposium on Hardware-Oriented Security and Trust"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions","volume":"297","author":"pappu","year":"2002","journal-title":"Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"journal-title":"Car Hacked on 60 Minutes","year":"2015","key":"ref1"}],"event":{"name":"2015 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2015,9,15]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2015,9,17]]}},"container-title":["2015 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311169\/7322434\/07322461.pdf?arnumber=7322461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T23:33:05Z","timestamp":1498260785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7322461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/hpec.2015.7322461","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}