{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T12:44:38Z","timestamp":1768567478652,"version":"3.49.0"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/msec.2025.3528535","type":"journal-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:01:33Z","timestamp":1743044493000},"page":"101-106","source":"Crossref","is-referenced-by-count":2,"title":["Software Bill of Materials as a Proactive Defense"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1450-3744","authenticated-orcid":false,"given":"Hamed","family":"Okhravi","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology (MIT) Lincoln Laboratory, Lexington, MA, USA"}]},{"given":"Nathan","family":"Burow","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology (MIT) Lincoln Laboratory, Lexington, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4902-018X","authenticated-orcid":false,"given":"Fred B.","family":"Schneider","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2021.3051235"},{"key":"ref2","volume-title":"XZ\/Utils\/backdoor"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2023.3321189"},{"key":"ref4","volume-title":"NIST glossary"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"ref6","article-title":"Apple scrambles after 40 malicious XcodeGhost apps haunt app store,","volume-title":"Ars Technica","author":"Goodin","year":"2015"},{"key":"ref7","article-title":"Executive order 14028: Improving the nations cybersecurity,","volume-title":"The White House","year":"2021"},{"key":"ref8","article-title":"SBOM requirements in the EUs CRA (cyber resilience act),","volume-title":"FOSSA","author":"Turner","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2021.3073045"},{"key":"ref10","article-title":"National Telecommunications and Information Administration","volume-title":"SBOM Explainer: What is SBOM?","year":"2020"},{"key":"ref11","volume-title":"Software products arent cookies","author":"Lipner"},{"key":"ref12","volume-title":"The minimum elements for a software bill of materials (SBOM)"},{"key":"ref13","volume-title":"Managing security risks inherent in the use of thirdparty components","year":"2017"},{"key":"ref14","volume-title":"SDL process guidance version 5.2","year":"2012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2022.3142338"},{"key":"ref16","volume-title":"ITI Letter to office of management and budget","author":"Bitko","year":"2022"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/10942488\/10942514.pdf?arnumber=10942514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:39:30Z","timestamp":1743223170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10942514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":16,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2025.3528535","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}