{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T06:03:09Z","timestamp":1720245789131},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Research Foundation of Korea funded by the Korea government","award":["NRF-2017R1A2B4002000"],"award-info":[{"award-number":["NRF-2017R1A2B4002000"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/tdsc.2019.2924624","type":"journal-article","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T16:57:22Z","timestamp":1561481842000},"page":"1-1","source":"Crossref","is-referenced-by-count":6,"title":["S2Net: Preserving Privacy in Smart Home Routers"],"prefix":"10.1109","author":[{"given":"Seung-seob","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"SuKyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Linaro - implications of meltdown and spectre : Part 2","author":"bech","year":"2018"},{"key":"ref38","article-title":"Speculative processor vulnerability.","year":"0"},{"key":"ref33","article-title":"Disk benchmark software.","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1603387"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2861756"},{"key":"ref30","article-title":"Secure boot on i.MX50, i.MX53, and i.MX 6 series using HABv4","year":"0"},{"key":"ref37","article-title":"Spectre attacks: Exploiting speculative execution","author":"kocher","year":"2018","journal-title":"arXiv 1801 01203"},{"key":"ref36","first-page":"973","article-title":"Meltdown: Reading Kernel Memory from User Space","author":"lipp","year":"2018","journal-title":"In 27th USENIX Secur Symp (USENIX Secur 18)"},{"key":"ref35","article-title":"YouTube help, live encoder settings, bitrates, and resolutions.","year":"0"},{"key":"ref34","article-title":"Building energy-efficient systems for sequential I\/O workloads","author":"davis","year":"2010"},{"key":"ref28","article-title":"OpenSSL cryptography and SSL\/TLS toolkit.","year":"0"},{"key":"ref27","article-title":"NXP i.MX 6Quad processors.","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.378"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2EW.2016.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"ref20","article-title":"ARM security technology - building a secure system using TrustZone technology.","year":"0"},{"key":"ref22","year":"0"},{"key":"ref21","article-title":"Genode operating system framework.","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref23","year":"2003"},{"key":"ref26","article-title":"fTPM: A firmware-based TPM 2.0 implementation","author":"raj","year":"2015"},{"key":"ref25","author":"pearson","year":"2003","journal-title":"Trusted Computing Platforms TCPA Technology in Context"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967380"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1831407.1831429"},{"key":"ref56","article-title":"Chapter 46. Boost.Xpressive.","author":"niebler","year":"0"},{"key":"ref55","year":"0"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400109"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273025"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950399"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2861756"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081349"},{"key":"ref13","first-page":"2005","article-title":"ARM security technology - building a secure system using TrustZone technology","year":"0"},{"key":"ref14","year":"0"},{"key":"ref15","article-title":"New range of smart home products accommodates early and new adopters of home automation","author":"patil","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1463-5_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.64"},{"key":"ref18","year":"0"},{"key":"ref19","article-title":"Overview of Application Virtualization","year":"0"},{"key":"ref4","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.357"},{"key":"ref6","author":"constantin","year":"0"},{"key":"ref5","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"ref7","year":"0"},{"key":"ref49","article-title":"TLS proxy server extension. draft-mcgrew-tls-proxyserver-01","author":"mcgrew","year":"0"},{"key":"ref9","first-page":"267","article-title":"Shielding applications from an untrusted cloud with haven","author":"baumann","year":"2014","journal-title":"Proc 11th USENIX Symp Operating Syst Des Implementation"},{"key":"ref46","article-title":"Intel Software guard extensions programming reference","year":"2014"},{"key":"ref45","article-title":"TPM main specification level 2 Version 1.2, Revision 116","year":"2011"},{"key":"ref48","article-title":"Explicit Proxy in HTTP\/2.0 draft-rpeon-httpbis-exproxy-00","author":"peon","year":"0"},{"key":"ref47","article-title":"Explicit trusted proxy in HTTP\/2.0. draft-loreto-httpbis-trusted-proxy20&#x2013;01","author":"loreto","year":"2014"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2893177"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"ref44","article-title":"AWS CloudHSM getting started guide","year":"2013"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950399"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/08744305.pdf?arnumber=8744305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:13Z","timestamp":1642003513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8744305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2924624","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}