{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:19:58Z","timestamp":1770844798761,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1109\/cars67163.2025.11337291","type":"proceedings-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:06:15Z","timestamp":1769029575000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Authorization in UEFI Firmware for DaaS Applications"],"prefix":"10.1109","author":[{"given":"Rui","family":"Mendon\u00e7a","sequence":"first","affiliation":[{"name":"CRACS &#x0026; INESC TEC,Porto,Portugal"}]},{"given":"Maria","family":"Tavares","sequence":"additional","affiliation":[{"name":"CRACS &#x0026; INESC TEC,Porto,Portugal"}]},{"given":"Paulo","family":"Maio","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico do Porto,ISEP,Porto,Portugal"}]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico do Porto,CRACS &#x0026; INESC TEC and ESTG,Felgueiras,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"867","DOI":"10.3390\/electronics12040867","article-title":"Authentication-chains: Blockchain-inspired lightweight authentication protocol for iot networks","volume":"12","author":"Ahmed","year":"2023","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s24113575"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10279752"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/WCNC.2019.8885769","article-title":"Blockchain-based firmware update scheme tailored for autonomous vehicles","volume-title":"IEEE Wireless Communications and Networking Conference","author":"Baza","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/apec42165.2021.9487468"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2975920"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s41635-019-00079-5","article-title":"Blockchain in iot: Current trends, challenges, and future roadmap","volume":"3","author":"Cui","year":"2019","journal-title":"Journal of Hardware and Systems Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","article-title":"Ascon v1.2: Lightweight authenticated encryption and hashing","volume":"34","author":"Dobraunig","year":"2021","journal-title":"Journal of Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1983.1056650"},{"key":"ref13","volume-title":"Device as a service-an economic model","author":"Hruby","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ispras51486.2020.00010"},{"key":"ref15","volume-title":"Intel: Device as a service (daas)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","article-title":"Blockchain-based secure firmware update for embedded devices in an internet of things environment","volume":"73","author":"Lee","year":"2017","journal-title":"Journal of Supercomputing"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/ICSESS54813.2022.9930157","article-title":"Cross-domain authentication scheme for iot devices based on blockchain","volume-title":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","author":"Li","year":"2022"},{"key":"ref18","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icccnt56998.2023.10306953"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icacite57410.2023.10182897"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102950"},{"key":"ref22","volume-title":"Sok: Security below the os - a security analysis of uefi","author":"Surve","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-81928-5_11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/icsssm.2016.7538424"},{"key":"ref25","volume-title":"Au-thenticate and verification source files using sha256 and hmac algorithms","author":"Uriawan","year":"2024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2019.2895123"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100240"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icsa.2017.33"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-1-4302-6146-9_3","article-title":"Platform boot integrity: Foundation for trusted compute pools","author":"Yeluri","year":"2014","journal-title":"Building the Infrastructure for Cloud Security"},{"key":"ref30","article-title":"An over-the-blockchain firmware update framework for iot devices","volume-title":"DSC 2018 \u2013 2018 IEEE Conference on Dependable and Secure Computing","author":"Yohan","year":"2019"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1109\/BigDataCongress.2017.85","article-title":"An overview of blockchain technology: Architecture, consensus, and future trends","volume-title":"Proceedings - 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017","author":"Zheng","year":"2017"}],"event":{"name":"2025 Cyber Awareness and Research Symposium (CARS)","location":"Grand Forks, ND, USA","start":{"date-parts":[[2025,10,27]]},"end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 Cyber Awareness and Research Symposium (CARS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11335408\/11336214\/11337291.pdf?arnumber=11337291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:49:04Z","timestamp":1770842944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11337291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cars67163.2025.11337291","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}