{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T18:52:21Z","timestamp":1676400741145},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1109\/tifs.2011.2166960","type":"journal-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T20:23:45Z","timestamp":1315859025000},"page":"321-332","source":"Crossref","is-referenced-by-count":11,"title":["Architecture Support for Dynamic Integrity Checking"],"prefix":"10.1109","volume":"7","author":[{"given":"Arun K.","family":"Kanuparthi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Zahran","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"HP Interactive CACTI"},{"key":"ref32","year":"0","journal-title":"Valgrind exp-bbvBasic Block Vector Generation Tool"},{"key":"ref31","first-page":"19","article-title":"Memory bandwidth and machine balance in current high performance computers","author":"mccalpin","year":"1995","journal-title":"IEEE Comput Soc Tech Committee Comput Architecture (TCCA) Newsletter"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2005.1430554"},{"key":"ref35","author":"davis","year":"0","journal-title":"FreePDK45"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/69.979978"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_7"},{"key":"ref11","first-page":"168","article-title":"Architecturual support for copy and tamper resistant software","author":"lie","year":"2000","journal-title":"Proc Int l Conf Architectural Support for Programming Languages and Operating Systems"},{"key":"ref12","first-page":"350","article-title":"Feasibility study of on-chip dynamic trusted platform module","author":"kanuparthi","year":"2010","journal-title":"Proc 28th IEEE Int Conf Computer Design"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676899"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/11427995_54","article-title":"CODESSEAL: Compiler\/FPGA approach to secure applications","author":"gelbart","year":"2005","journal-title":"Proc IEEE Int Conf Intell Security Informatics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2004.1347961"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/605397.605409","article-title":"Enabling trusted software integrity","volume":"acm","author":"kirovski","year":"2002","journal-title":"Proc Int l Conf Architectural Support for Programming Languages and Operating Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/12.381947"},{"key":"ref4","article-title":"The advanced return-into-lib(c) exploits: PaX case study","volume":"11","author":"nergal","year":"2001","journal-title":"Phrack Mag"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/12.752653"},{"key":"ref3","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack Mag"},{"key":"ref6","author":"ng","year":"2008","journal-title":"Trusted Platform ModuleTPM Fundamental"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919638"},{"key":"ref5","year":"2010","journal-title":"Vulnerability notes database"},{"key":"ref8","author":"rutkowska","year":"2009","journal-title":"Evil Maid Goes After TrueCrypt!"},{"key":"ref7","first-page":"45","article-title":"Lest we remember: Cold boot attacks on encryption keys","author":"halderman","year":"2008","journal-title":"Proc 17th USENIX Security Symp"},{"key":"ref2","first-page":"227","article-title":"Buffer overflows: Attacks and defenses for the vulnerability of the decade","author":"cowan","year":"2004","journal-title":"Foundations of Intrusion Tolerant Systems 2003 [Organically Assured and Survivable Information Systems]"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456458"},{"key":"ref1","year":"2008","journal-title":"Trusted Platform Module (TPM) Summary"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2004.1413018"},{"key":"ref22","year":"2008","journal-title":"WD Caviar Blue Drive Specifications (250750 GB SATA)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1997.645805"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2003.1238018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1994.288147"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/859654.859657"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6126191\/06008639.pdf?arnumber=6008639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:46:30Z","timestamp":1633909590000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6008639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":35,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2011.2166960","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2]]}}}