{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:42:57Z","timestamp":1764225777024,"version":"3.37.3"},"reference-count":72,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100005595","name":"University of California","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833737","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2413-2429","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA"],"prefix":"10.1109","author":[{"given":"Ivan","family":"De Oliveira Nunes","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Seoyeon","family":"Hwang","sequence":"additional","affiliation":[{"name":"UC Irvine"}]},{"given":"Sashidhar","family":"Jakkamsetti","sequence":"additional","affiliation":[{"name":"UC Irvine"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"UC Irvine"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033231"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00106"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2684806"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23170"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169976"},{"key":"ref53","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"2003","journal-title":"USENIX Security Symposium"},{"journal-title":"Temperature sensor code","year":"0","key":"ref52"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"ref11","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic","volume":"abs 1705 6805","author":"apthorpe","year":"2017","journal-title":"CoRR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref10","article-title":"Closing the blinds: Four strategies for protecting smart home privacy from network observers","author":"apthorpe","year":"2017","journal-title":"arXiv preprint arXiv 1705 06809"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"ref16","article-title":"SMART: Secure and minimal architecture for (establishing dynamic) root of trust","author":"eldefrawy","year":"2012","journal-title":"NDSS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00036"},{"key":"ref18","article-title":"VRASED: A verified hardware\/software co-design for remote attestation","author":"de oliveira nunes","year":"2019","journal-title":"Usenix Security"},{"journal-title":"Motion sensor code","year":"0","key":"ref51"},{"journal-title":"MSP430 ultra-low-power sensing and measurement MCUs","year":"0","key":"ref50"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46520-3_8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3190-6_4"},{"key":"ref48","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"journal-title":"Model checking","year":"2018","author":"clarke","key":"ref42"},{"journal-title":"Automated Theorem Proving A Logical Basis","year":"2016","author":"loveland","key":"ref41"},{"key":"ref44","first-page":"1156","article-title":"Verilog2SMV: A Tool for Word-Level Verification","author":"ahmed irfan","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2004.1260985"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"ref7","first-page":"1519","article-title":"JEDI: Many-to-many end-to-end encryption and key delegation for iot","author":"kumar","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref9","article-title":"Keeping the smart home private with smart (er) iot traffic shaping","author":"apthorpe","year":"2018","journal-title":"arXiv preprint arXiv 1812 00287"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994555"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.28"},{"key":"ref40","article-title":"GAROTA: generalized active root-of-trust architecture","volume":"abs 2102 7014","author":"aliaj","year":"2021","journal-title":"CoRR"},{"key":"ref35","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","author":"costan","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"journal-title":"Intel software guard extensions (intel sgx)","year":"0","key":"ref34"},{"journal-title":"John Wiley & Sons Ltd","first-page":"295","year":"2010","key":"ref37"},{"journal-title":"Openmsp430","year":"2009","author":"girard","key":"ref36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427253"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942118"},{"journal-title":"VERSA source code","year":"2022","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849186"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484532"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"},{"journal-title":"8-bit AVR Microcontrollers ATmega328\/P","year":"2009","key":"ref71"},{"journal-title":"MSP430 Flash Memory Characteristics","year":"2018","key":"ref70"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS49796.2020.00031"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949036"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359661"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"journal-title":"Arm Trustzone","year":"2018","key":"ref66"},{"key":"ref22","article-title":"APEX: A verified architecture for proofs of execution on remote devices under full software compromise","author":"de oliveira nunes","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474029"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00042"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586180"},{"key":"ref60","article-title":"Copilot &#x2014; A coprocessor-based kernel runtime integrity monitor","author":"petroni","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"journal-title":"Trusted Platform Module (TPM)","year":"2017","key":"ref61"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833737.pdf?arnumber=9833737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:24:39Z","timestamp":1699485879000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833737","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}