{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T22:58:43Z","timestamp":1767913123230,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046582.2046596","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"71-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["Are hardware performance counters a cost effective way for integrity checking of programs"],"prefix":"10.1145","author":[{"given":"Corey","family":"Malone","sequence":"first","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY, USA"}]},{"given":"Mohamed","family":"Zahran","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY, USA"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"R. Ng \"Trusted Platform Module - TPM Fundamental \" http:\/\/www.asprg.net\/aptiss2008\/slides\/TPM Fundamentals-raymond ng.pdf August 2008.  R. Ng \"Trusted Platform Module - TPM Fundamental \" http:\/\/www.asprg.net\/aptiss2008\/slides\/TPM Fundamentals-raymond ng.pdf August 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676899"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605409"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_54"},{"key":"e_1_3_2_1_6_1","first-page":"452","article-title":"Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution","author":"Fiskiran A.","year":"2004","journal-title":"Proc. of IEEE International Conference on Computer Design"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000107"},{"key":"e_1_3_2_1_8_1","unstructured":"Y. Luo and K. W. Cameron \"Instruction-level characterization of scientific computing applications using hardware performance counters \" in Proceedings of the Workload Characterization: Methodology and Case Studies 1998.   Y. Luo and K. W. Cameron \"Instruction-level characterization of scientific computing applications using hardware performance counters \" in Proceedings of the Workload Characterization: Methodology and Case Studies 1998."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VALID.2010.8"},{"key":"e_1_3_2_1_11_1","unstructured":"R. Kennell and L. H. Jamieson \"Establishing the genuinity of remote computer systems \" in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12 2003.   R. Kennell and L. H. Jamieson \"Establishing the genuinity of remote computer systems \" in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12 2003."},{"key":"e_1_3_2_1_12_1","unstructured":"U. Shankar M. Chew and J. D. Tygar \"Side effects are not sufficient to authenticate software \" in Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 2004.   U. Shankar M. Chew and J. D. Tygar \"Side effects are not sufficient to authenticate software \" in Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 2004."},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/www.intel.com\/products\/processor\/manuals\/.  http:\/\/www.intel.com\/products\/processor\/manuals\/."},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/developer.amd.com\/assets\/intro to ca v3 final.pdf.  http:\/\/developer.amd.com\/assets\/intro to ca v3 final.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"K. Hoste and L. Eeckhout \"Comparing benchmarks using key microarchitecture-independent characteristics \" in IISWC 2006.  K. Hoste and L. Eeckhout \"Comparing benchmarks using key microarchitecture-independent characteristics \" in IISWC 2006.","DOI":"10.1109\/IISWC.2006.302732"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854103"},{"key":"e_1_3_2_1_17_1","first-page":"227","volume-title":"February 2004","author":"Cowan C."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS.2010.37"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"V. Weaver and S. A. McKee \"Can hardware performance counters be trusted?\" in IISWC 2008.  V. Weaver and S. A. McKee \"Can hardware performance counters be trusted?\" in IISWC 2008.","DOI":"10.1109\/IISWC.2008.4636099"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958804"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1165893"},{"key":"e_1_3_2_1_22_1","unstructured":"http:\/\/ctuning.org\/.  http:\/\/ctuning.org\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859657"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the sixth ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046582.2046596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046582.2046596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:20Z","timestamp":1750240100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046582.2046596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":23,"alternative-id":["10.1145\/2046582.2046596","10.1145\/2046582"],"URL":"https:\/\/doi.org\/10.1145\/2046582.2046596","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}