{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:17:50Z","timestamp":1755926270906,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1755733"],"award-info":[{"award-number":["CNS 1755733"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/jiot.2018.2890277","type":"journal-article","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T20:04:38Z","timestamp":1546373078000},"page":"3700-3711","source":"Crossref","is-referenced-by-count":16,"title":["Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1986-3554","authenticated-orcid":false,"given":"Benjamin","family":"Cyr","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6535-182X","authenticated-orcid":false,"given":"Jubayer","family":"Mahmod","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4819-8728","authenticated-orcid":false,"given":"Ujjwal","family":"Guin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"STM32 Microcontroller System Memory Boot Mode Transceiver Rev 32","year":"2018","key":"ref39"},{"journal-title":"Computer Architecture Fifth Edition A Quantitative Approach","year":"2011","author":"hennessy","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2018.8349685"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2016.7833683"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927428"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899029"},{"journal-title":"ARM How to Write a Bootloader","year":"2018","key":"ref37"},{"journal-title":"PICmicro Mid-Range MCU Family Reference Manual","year":"1997","key":"ref36"},{"journal-title":"AVR Instruction Set Manual","year":"2016","key":"ref35"},{"journal-title":"Introduction to x64 Assembly","year":"2012","author":"lomont","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"journal-title":"Update Firmware in the Field Using a Microcontrollers DFU Mode","year":"2018","author":"beningo","key":"ref40"},{"key":"ref11","first-page":"1","article-title":"Shedding too much light on a microcontroller&#x2019;s firmware protection","author":"obermaier","year":"2017","journal-title":"Proc 10th USENIX Workshop Offensive Technol (WOOT)"},{"journal-title":"STM32F4 series of high-performance MCUs with DSP and FPU instructions","year":"2018","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.42"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2174811"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_6"},{"journal-title":"Insecurity in the Internet of Things Security Response","year":"2015","author":"barcena","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"journal-title":"HP study reveals 70 percent of internet of things devices vulnerable to attack","year":"2014","author":"rawlinson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.7906898"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2009.5196217"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0028-8"},{"journal-title":"The big hack How china used a tiny chip to infiltrate u s companies","year":"2018","author":"robertson","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11824-6","author":"tehranipoor","year":"2015","journal-title":"Counterfeit Integrated Circuits - Detection and Avoidance"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"ref9","first-page":"265","article-title":"SMA: A system-level mutual authentication for protecting electronic hardware and firmware","volume":"14","author":"guin","year":"2017","journal-title":"IEEE Trans Depend Secure Comput"},{"journal-title":"Gartner says 8 4 billion connected &#x201C;things&#x201D; will be in use in 2017 up 31 percent from 2016","year":"2017","author":"van der meulen","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_5"},{"article-title":"Use of hashing in a secure boot loader","year":"2005","author":"morais","key":"ref22"},{"key":"ref21","first-page":"12","article-title":"Mouse trap: Exploiting firmware updates in USB peripherals","author":"maskiewicz","year":"2014","journal-title":"Proc 8th USENIX Conf Offensive Technol USENIX Assoc"},{"key":"ref42","first-page":"65","author":"knuth","year":"1998","journal-title":"The art of computer programming volume 3 (2nd ed ) sorting and searching"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1023833.1023873"},{"journal-title":"Matching Theory","year":"1986","author":"lova\u00edsz","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24586-2_5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"year":"2018","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6488907\/8709863\/8598922-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8709863\/08598922.pdf?arnumber=8598922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T16:14:40Z","timestamp":1694535280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8598922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":44,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2890277","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}