{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T00:48:52Z","timestamp":1774745332494,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653711","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"400-409","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":137,"title":["On the difficulty of software-based attestation of embedded devices"],"prefix":"10.1145","author":[{"given":"Claude","family":"Castelluccia","sequence":"first","affiliation":[{"name":"INRIA Rhone Alpes, Montbonnot, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"INRIA Rhone Alpes, montbonnot, France"}]},{"given":"Daniele","family":"Perito","sequence":"additional","affiliation":[{"name":"INRIA Rhone Alpes, Montbonnot, France"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"In Proceedings of the Second Usenix Workshop on Electronic Commerce","author":"Anderson R.","year":"1996","unstructured":"Anderson , R. , and Kuhn , M . Tamper resistance - a cautionary note . In In Proceedings of the Second Usenix Workshop on Electronic Commerce ( 1996 ). Anderson, R., and Kuhn, M. Tamper resistance - a cautionary note. In In Proceedings of the Second Usenix Workshop on Electronic Commerce (1996)."},{"key":"e_1_3_2_1_3_1","unstructured":"Atmel Corporation. Atmega128 datasheet. http:\/\/www.atmel.com\/atmel\/acrobat\/doc2467.pdf.  Atmel Corporation. Atmega128 datasheet. http:\/\/www.atmel.com\/atmel\/acrobat\/doc2467.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1802954.1803061"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322283"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514305"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"e_1_3_2_1_10_1","volume-title":"Texas Instruments Developper Conference","author":"Goodspeed T.","year":"2008","unstructured":"Goodspeed , T. Exploiting wireless sensor networks over 802.15.4 . In Texas Instruments Developper Conference ( 2008 ). Goodspeed, T. Exploiting wireless sensor networks over 802.15.4. In Texas Instruments Developper Conference (2008)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352563"},{"key":"e_1_3_2_1_12_1","volume-title":"Rootkits : Subverting the Windows Kernel","author":"Hoglund G.","year":"2005","unstructured":"Hoglund , G. , and Butler , J . Rootkits : Subverting the Windows Kernel . Addison-Wesley , 2005 . Hoglund, G., and Butler, J. Rootkits : Subverting the Windows Kernel. Addison-Wesley, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"key":"e_1_3_2_1_14_1","first-page":"40","author":"Huffman D.A.","year":"1962","unstructured":"Huffman , D.A. A method for the constructionof minimum redundancy codes. Proceedings of the IRE 40 ( 1962 ). Huffman, D.A. A method for the constructionof minimum redundancy codes. Proceedings of the IRE 40 (1962).","journal-title":"Proceedings of the IRE"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 18th USENIX Security Symposium (August","author":"Hund R.","year":"2009","unstructured":"Hund , R. , Holz , T. , and Freiling , F. C . Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms . In Proceedings of the 18th USENIX Security Symposium (August 2009 ). Hund, R., Holz, T., and Freiling, F. C. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th USENIX Security Symposium (August 2009)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251374"},{"key":"e_1_3_2_1_17_1","volume-title":"11th International Workshop, FSE 2004","author":"Klimov A.","year":"2004","unstructured":"Klimov , A. , and Shamir , A . New cryptographic primitives based on multiword t-functions. In Fast Software Encryption , 11th International Workshop, FSE 2004 ( 2004 ). Klimov, A., and Shamir, A. New cryptographic primitives based on multiword t-functions. In Fast Software Encryption, 11th International Workshop, FSE 2004 (2004)."},{"key":"e_1_3_2_1_18_1","volume-title":"September","author":"Krahmer S.","year":"2005","unstructured":"Krahmer , S. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Tech. rep., suse , September 2005 . available at http:\/\/www.suse.de\/ krahmer\/no-nx.pdf. Krahmer, S. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Tech. rep., suse, September 2005. available at http:\/\/www.suse.de\/ krahmer\/no-nx.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322286"},{"key":"e_1_3_2_1_20_1","first-page":"4","volume":"58","author":"Nergal","year":"2001","unstructured":"Nergal . The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine 58 , 4 ( 2001 ). http:\/\/www.phrack.org\/issues.html?issue=58&id=4http:\/\/www.phrack.or%g\/issues.html?issue=58&id=4. Nergal. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine 58, 4 (2001). http:\/\/www.phrack.org\/issues.html?issue=58&id=4http:\/\/www.phrack.or%g\/issues.html?issue=58&id=4.","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of Embedded Security in Cars Workshop (ESCAR 2004)","author":"Seshadri A.","year":"2004","unstructured":"Seshadri , A. , Perrig , A. , van Doorn , L. , and Khosla , P . Using SWATT for verifying embedded systems in cars . In Proceedings of Embedded Security in Cars Workshop (ESCAR 2004) ( Nov. 2004 ). Seshadri, A., Perrig, A., van Doorn, L., and Khosla, P. Using SWATT for verifying embedded systems in cars. In Proceedings of Embedded Security in Cars Workshop (ESCAR 2004) (Nov. 2004)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_3"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 13th USENIX Security Symposium (August","author":"Shankar U.","year":"2004","unstructured":"Shankar , U. , Chew , M. , and Tygar , J. D . Side effects are not sufficient to authenticate software . In Proceedings of the 13th USENIX Security Symposium (August 2004 ). Shankar, U., Chew, M., and Tygar, J. D. Side effects are not sufficient to authenticate software. In Proceedings of the 13th USENIX Security Symposium (August 2004)."},{"key":"e_1_3_2_1_30_1","volume-title":"August","author":"Solar Designer","year":"1997","unstructured":"Solar Designer . return-to-libc attack. Bugtraq mailing list , August 1997 . Solar Designer. return-to-libc attack. Bugtraq mailing list, August 1997."},{"key":"e_1_3_2_1_31_1","unstructured":"Texas Instruments. Msp430 f1611 datasheet.  Texas Instruments. Msp430 f1611 datasheet."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542452.1542461"},{"key":"e_1_3_2_1_33_1","volume-title":"SRDS","author":"Yang Y.","year":"2007","unstructured":"Yang , Y. , Wang , X. , Zhu , S. , and Cao , G . Distributed software-based attestation for node compromise detection in sensor networks . In SRDS ( 2007 ), IEEE Computer Society . Yang, Y., Wang, X., Zhu, S., and Cao, G. Distributed software-based attestation for node compromise detection in sensor networks. In SRDS (2007), IEEE Computer Society."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","location":"Chicago Illinois USA","acronym":"CCS '09","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:53Z","timestamp":1750253933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":33,"alternative-id":["10.1145\/1653662.1653711","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653711","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}