{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:22Z","timestamp":1750308202179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,19]],"date-time":"2004-09-19T00:00:00Z","timestamp":1095552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,19]]},"DOI":"10.1145\/1133572.1133600","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Secure bootstrap is not enough"],"prefix":"10.1145","author":[{"given":"James","family":"Hendricks","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Leendert","family":"van Doorn","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2004,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_2_1","unstructured":"Arm storage: Seagate-Cheetah family of disk drives. http:\/\/www.arm.com\/markets\/armpp\/462.html.  Arm storage: Seagate-Cheetah family of disk drives. http:\/\/www.arm.com\/markets\/armpp\/462.html."},{"key":"e_1_3_2_1_3_1","unstructured":"J. Davidson. Chips to crack Xbox released on internet. Australian Financial Review page 16 (Computers) 21 Jun 2003.  J. Davidson. Chips to crack Xbox released on internet. Australian Financial Review page 16 (Computers) 21 Jun 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_1_5_1","unstructured":"LinuxBIOS. http:\/\/www.linuxbios.org.  LinuxBIOS. http:\/\/www.linuxbios.org."},{"key":"e_1_3_2_1_6_1","unstructured":"Myricom home page. http:\/\/www.myrinet.com.  Myricom home page. http:\/\/www.myrinet.com."},{"volume-title":"Proceedings of the 13th Usenix Security Symposium","year":"2004","author":"Sailer R.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"T. Smith. Warner attempts to out-hack DVD hackers. http:\/\/www.theregister.co.uk\/content\/2\/13834.html Sep 2000.  T. Smith. Warner attempts to out-hack DVD hackers. http:\/\/www.theregister.co.uk\/content\/2\/13834.html Sep 2000."},{"volume-title":"Proceedings of the 2nd Usenix Conference on File and Storage Technologies","year":"2003","author":"Soules C. A. N.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_13_1","unstructured":"The Trusted Computing Group: Home. http:\/\/www.trustedcomputinggroup.org.  The Trusted Computing Group: Home. http:\/\/www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_14_1","unstructured":"The Trusted Computing Group. TPM Main: Part I Design Principles Oct 2003.  The Trusted Computing Group. TPM Main: Part I Design Principles Oct 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"The Trusted Gomputing Group. TCG PC Specific Implementation Specification Aug 2003.  The Trusted Gomputing Group. TCG PC Specific Implementation Specification Aug 2003."},{"key":"e_1_3_2_1_16_1","unstructured":"U.S. National Institute of Standards and Technology. Security Requirements for Cryptographic Modules Jan 1994. FIPS PUB 140--2.  U.S. National Institute of Standards and Technology. Security Requirements for Cryptographic Modules Jan 1994. FIPS PUB 140--2."},{"key":"e_1_3_2_1_17_1","unstructured":"R. Wojtczuk. Defeating solar designer's non-executable stack patch. http:\/\/www.insecure.org\/sploits\/nonexecutable.stack.problems.html Jan 1998.  R. Wojtczuk. Defeating solar designer's non-executable stack patch. http:\/\/www.insecure.org\/sploits\/nonexecutable.stack.problems.html Jan 1998."}],"event":{"name":"EW04: ACM SIGOPS European Workshop 2004","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Leuven Belgium","acronym":"EW04"},"container-title":["Proceedings of the 11th workshop on ACM SIGOPS European workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1133572.1133600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1133572.1133600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:05Z","timestamp":1750263905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1133572.1133600"}},"subtitle":["shoring up the trusted computing base"],"short-title":[],"issued":{"date-parts":[[2004,9,19]]},"references-count":16,"alternative-id":["10.1145\/1133572.1133600","10.1145\/1133572"],"URL":"https:\/\/doi.org\/10.1145\/1133572.1133600","relation":{},"subject":[],"published":{"date-parts":[[2004,9,19]]},"assertion":[{"value":"2004-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}