{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:34Z","timestamp":1750307614097,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456482.1456490","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"45-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Binding software to specific native hardware in a VM environment"],"prefix":"10.1145","author":[{"given":"Mikhail J.","family":"Atallah","sequence":"first","affiliation":[{"name":"Arxan Technologies, Inc. and Purdue University, West Lafayette, IN, USA"}]},{"given":"Eric D.","family":"Bryant","sequence":"additional","affiliation":[{"name":"Arxan Technologies, Inc., Huntsville, AL, USA"}]},{"given":"John T.","family":"Korb","sequence":"additional","affiliation":[{"name":"Arxan Technologies, Inc. and Purdue University, West Lafayette, IN, USA"}]},{"given":"John R.","family":"Rice","sequence":"additional","affiliation":[{"name":"Arxan Technologies, Inc. and Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"issue":"11","key":"e_1_3_2_1_1_1","first-page":"12","volume":"17","author":"Atallah M. J.","year":"2004","unstructured":"M. J. Atallah , E. D. Bryant , and M. R. Stytz . A survey of anti-tamper technologies. CrossTalk: The Journal of Defense Software Engineering 17 ( 11 ): 12 -- 16 , 11 2004 . M. J. Atallah, E. D. Bryant, and M. R. Stytz. A survey of anti-tamper technologies. CrossTalk: The Journal of Defense Software Engineering 17(11):12--16, 11 2004.","journal-title":"A survey of anti-tamper technologies. CrossTalk: The Journal of Defense Software Engineering"},{"key":"e_1_3_2_1_2_1","first-page":"512","volume-title":"CRYPTO","author":"Campbell K. W.","year":"1992","unstructured":"K. W. Campbell and M. J. Wiener . Des is not a group . In CRYPTO pages 512 -- 520 , 1992 . K. W. Campbell and M. J. Wiener. Des is not a group. In CRYPTO pages 512--520, 1992."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2007.4380646"},{"key":"e_1_3_2_1_6_1","volume-title":"Protocols, Algorithms, and Source Code in C John Wiley and Sons","author":"Schneier B.","year":"1996","unstructured":"B. Schneier . Applied Cryptography : Protocols, Algorithms, and Source Code in C John Wiley and Sons ,Inc.,New York ,NY,USA,second edition, 1996 . B.Schneier.Applied Cryptography: Protocols, Algorithms, and Source Code in C John Wiley and Sons,Inc.,New York,NY,USA,second edition,1996."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 8th Cryptographic Hardware and Embedded Systems Workshop (CHES), Yokohama, Japan","volume":"4249","author":"Simpson E.","year":"2006","unstructured":"E. Simpson and P. Schaumont . Offline hardware\/software authentication for recon figurable platforms. In L. Goubin and M. Matsui, editors , Proceedings of the 8th Cryptographic Hardware and Embedded Systems Workshop (CHES), Yokohama, Japan volume 4249 of Lecture Notes in Computer Science pages 311--323.Springer , October 2006 . E. Simpson and P. Schaumont. Offline hardware\/software authentication for recon figurable platforms. In L. Goubin and M. Matsui, editors, Proceedings of the 8th Cryptographic Hardware and Embedded Systems Workshop (CHES), Yokohama, Japan volume 4249 of Lecture Notes in Computer Science pages 311--323.Springer, October 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 1st ACM workshop on Virtual machine security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456482.1456490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456482.1456490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456482.1456490"}},"subtitle":["the puf challenge and opportunity"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":8,"alternative-id":["10.1145\/1456482.1456490","10.1145\/1456482"],"URL":"https:\/\/doi.org\/10.1145\/1456482.1456490","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}