{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:51Z","timestamp":1750307991756,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128847","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Software integrity protection using timed executable agents"],"prefix":"10.1145","author":[{"given":"Juan A.","family":"Garay","sequence":"first","affiliation":[{"name":"Bell Labs -- Lucent Technologies, Murray Hill, NJ"}]},{"given":"Lorenz","family":"Huelsbergen","sequence":"additional","affiliation":[{"name":"Bell Labs -- Lucent Technologies, Murray Hill, NJ"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A. V.","year":"1986","unstructured":"A. V. Aho , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques, and Tools . Addison-Wesley , 1986 .]] A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_1_3_1","first-page":"236","volume-title":"Proc. CRYPTO '00","author":"Boneh D.","year":"1880","unstructured":"D. Boneh and M. Naor . Timed commitments (extended abstract) . In Proc. CRYPTO '00 , LNCS( 1880 ), pp. 236 -- 254 , Springer--Verlag , August 2000.]] D. Boneh and M. Naor. Timed commitments (extended abstract). In Proc. CRYPTO '00, LNCS(1880), pp. 236--254, Springer--Verlag, August 2000.]]"},{"key":"e_1_3_2_1_4_1","first-page":"199","volume-title":"Proc. CRYPTO '82","author":"Chaum D.","year":"1983","unstructured":"D. Chaum . Blind signatures for untraceable payments . In Proc. CRYPTO '82 , pp. 199 -- 203 . Plenum Press , New York and London, 1983 , August 1982.]] D. Chaum. Blind signatures for untraceable payments. In Proc. CRYPTO '82, pp. 199--203. Plenum Press, New York and London, 1983, August 1982.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_8_1","first-page":"139","volume-title":"Proc. CRYPTO '92","author":"Dwork C.","year":"1992","unstructured":"C. Dwork and M. Naor . Pricing via processing or combatting junk mail . In Proc. CRYPTO '92 , LNCS(740), pp. 139 -- 147 , Springer--Verlag , August 1992 .]] C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proc. CRYPTO '92, LNCS(740), pp. 139--147, Springer--Verlag, August 1992.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Sarnoff Symposium on \"Advances in Wired and Wireless Communications,\"","author":"Esparza O.","year":"2003","unstructured":"O. Esparza , M. Soriano , J. Mu\u00f1oz and J. Forn\u00e9 . Limiting the execution time in a host: a way of protecting mobile agents . In IEEE Sarnoff Symposium on \"Advances in Wired and Wireless Communications,\" 2003 .]] O. Esparza, M. Soriano, J. Mu\u00f1oz and J. Forn\u00e9. Limiting the execution time in a host: a way of protecting mobile agents. In IEEE Sarnoff Symposium on \"Advances in Wired and Wireless Communications,\" 2003.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"to Automata Theory, Languages, and Computation","author":"Hopcroft J. E.","year":"1979","unstructured":"J. E. Hopcroft and J. D. Ullman . Int . to Automata Theory, Languages, and Computation . Addison-Wesley , 1979 .]] J. E. Hopcroft and J. D. Ullman. Int. to Automata Theory, Languages, and Computation. Addison-Wesley, 1979.]]"},{"key":"e_1_3_2_1_11_1","first-page":"295","volume-title":"12th USENIX Security Symposium","author":"Kennell R.","year":"2003","unstructured":"R. Kennell and L. Jamieson . Establishing the genuinity of remote computer systems . In 12th USENIX Security Symposium , pp. 295 -- 310 , 2003 .]] R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In 12th USENIX Security Symposium, pp. 295--310, 2003.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Program Flow Analysis: Theory and Applications Prentice-Hall","author":"Muchnick S. S.","year":"1981","unstructured":"S. S. Muchnick and N. D. Jones . Program Flow Analysis: Theory and Applications Prentice-Hall , 1981 .]] S. S. Muchnick and N. D. Jones. Program Flow Analysis: Theory and Applications Prentice-Hall, 1981.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Time-lock puzzles and timed-release crypto. MIT\/LCS\/TR-684","author":"Rivest R.","year":"1996","unstructured":"R. Rivest , A. Shamir , and D. Wagner . Time-lock puzzles and timed-release crypto. MIT\/LCS\/TR-684 , 1996 .]] R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release crypto. MIT\/LCS\/TR-684, 1996.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Mobile Agents and Security, LNCS(1419)","author":"Sanders T.","year":"1998","unstructured":"T. Sanders and C. Tschudin . Protecting mobile agents against malicious hosts . In Mobile Agents and Security, LNCS(1419) , Springer--Verlag , 1998 .]] T. Sanders and C. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, LNCS(1419), Springer--Verlag, 1998.]]"},{"key":"e_1_3_2_1_15_1","first-page":"89","volume-title":"In 13th USNIX Security Symposium","author":"Shankar U.","year":"2004","unstructured":"U. Shankar , M. Chew and J.D. Tygar . Side effects are not sufficient to authenticate software . In In 13th USNIX Security Symposium , pp. 89 -- 101 , 2004 .]] U. Shankar, M. Chew and J.D. Tygar. Side effects are not sufficient to authenticate software. In In 13th USNIX Security Symposium, pp. 89--101, 2004.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy","author":"Seshadri A.","year":"2004","unstructured":"A. Seshadri , A. Perrig , L. van Doorn and P. Khosla , SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy , 2004 .]] A. Seshadri, A. Perrig, L. van Doorn and P. Khosla, SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy, 2004.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"22nd National Information Systems Security Conference.","author":"Smith S.","year":"1999","unstructured":"S. Smith , R. Perez , S. Weingard , and V. Austel . Validating a high-performance, programmable secure coprocessor . In 22nd National Information Systems Security Conference. October 1999 .]] S. Smith, R. Perez, S. Weingard, and V. Austel. Validating a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference. October 1999.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/www.trustedcomputinggroup.org\/","author":"Trusted Computing Group (TCG).","year":"2003","unstructured":"Trusted Computing Group (TCG). https:\/\/www.trustedcomputinggroup.org\/ , 2003 .]] Trusted Computing Group (TCG). https:\/\/www.trustedcomputinggroup.org\/, 2003.]]"},{"key":"e_1_3_2_1_20_1","volume-title":"MIT Press","author":"Wolfe M.","year":"1989","unstructured":"M. Wolfe . Optimizing Supercompilers for Supercomputers . MIT Press , 1989 .]] M. Wolfe. Optimizing Supercompilers for Supercomputers. MIT Press, 1989.]]"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":17,"alternative-id":["10.1145\/1128817.1128847","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128847","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}