{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:24:46Z","timestamp":1770747886596,"version":"3.49.0"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. C"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/tsmcc.2011.2106493","type":"journal-article","created":{"date-parts":[[2011,3,15]],"date-time":"2011-03-15T15:04:05Z","timestamp":1300201445000},"page":"187-200","source":"Crossref","is-referenced-by-count":15,"title":["FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems"],"prefix":"10.1109","volume":"42","author":[{"given":"Cataldo","family":"Basile","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Di Carlo","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Scionti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912030"},{"key":"ref33","year":"0"},{"key":"ref32","first-page":"16","article-title":"Design and implementation of a TCG-based integrity measurement architecture","author":"sailer","year":"0","journal-title":"Proc 3th USENIX Secur Symp"},{"key":"ref31","first-page":"1","article-title":"Revisiting software protection","author":"van oorschot","year":"0","journal-title":"Proc Inf Secur Conf (Lecture Notes in Computer Science) Berlin\/Heidelberg"},{"key":"ref30","year":"0"},{"key":"ref37","year":"0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICENT.2010.5532274"},{"key":"ref35","year":"0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2010.5546254"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref27","first-page":"295","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"0","journal-title":"Proc 12th USENIX Secur Symp"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-843-2"},{"key":"ref20","first-page":"160","article-title":"Protecting software code by guards","author":"chang","year":"0","journal-title":"Proc ACM Workshop Secur Privacy Digital Rights Manage"},{"key":"ref22","first-page":"86","article-title":"Towards tamper resistant code encryption: Practice and experience","author":"cappaert","year":"0","journal-title":"Proc 2nd Inf Secur Pract Exp Conf (Lecture Notes in Computer) New York Springer"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.53"},{"key":"ref23","first-page":"400","article-title":"Oblivious hashing: A stealthy software integrity verification primitive","author":"chen","year":"0","journal-title":"Proc Int Workshop Inf Hiding (Lecture Notes in Computer Science) F Petitcolas"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311255"},{"key":"ref51","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2009.53"},{"key":"ref11","first-page":"201","article-title":"Microprocessor fault-tolerance via on-the-fly partial reconfiguration","author":"carlo","year":"0","journal-title":"Proc IEEE Eur Test Symp"},{"key":"ref40","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref13","first-page":"193","article-title":"Protection of software-based survivability mechanisms","author":"wang","year":"0","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"855","DOI":"10.3233\/JCS-2009-0345","article-title":"Semantics-based code obfuscation by abstract interpretation","volume":"17","author":"dalla preda","year":"2009","journal-title":"J Comput Secur"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.100"},{"key":"ref16","year":"0"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"331","DOI":"10.3233\/JCS-2009-0322","article-title":"Address-space layout randomization using code islands","volume":"17","author":"xu","year":"2009","journal-title":"J Comput Secur"},{"key":"ref18","first-page":"1","article-title":"On the (im)possibility of obfuscating programs","author":"goldreich","year":"0","journal-title":"Proc 21st Annu Int Cryptol Conf Adv Cryptol (Lecture Notes in Computer Science) New York Springer-Verlag"},{"key":"ref19","first-page":"317","article-title":"Tamper resistant software: an implementation","author":"aucsmith","year":"0","journal-title":"Proc 1st Int Workshop Inf Hiding"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/508352.508353"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref5","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2005.1584007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2007.51"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2008.166"},{"key":"ref9","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015052"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1344671.1344729"},{"key":"ref48","first-page":"60","article-title":"Embedded trusted computing with authenticated non-volatile memory","author":"schellekens","year":"2008","journal-title":"Proc 1st Int Conf Trusted Comput Trust Inf Technol"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278483"},{"key":"ref42","first-page":"13","article-title":"COPILOT&#x2014;A coprocessor-based kernel runtime integrity monitor","author":"petroni","year":"0","journal-title":"Proc 13th Conf USENIX Secur Symp"},{"key":"ref41","first-page":"147","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using FDR","author":"lowe","year":"0","journal-title":"Proc 7th Int Conf Tools Algorithms Constr Anal Syst (Lecture Notes in Computer Science) New York Springer-Verlag"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","article-title":"The Scyther tool: Verification, falsification, and analysis of security protocols","author":"cremers","year":"2008","journal-title":"Proc 20th Int Conf Comput Aided Verification"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5326\/6151926\/05727971.pdf?arnumber=5727971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:43Z","timestamp":1633909963000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5727971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":51,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsmcc.2011.2106493","relation":{},"ISSN":["1094-6977","1558-2442"],"issn-type":[{"value":"1094-6977","type":"print"},{"value":"1558-2442","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}