{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:20:39Z","timestamp":1772644839267,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046711","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["VIPER"],"prefix":"10.1145","author":[{"given":"Yanlin","family":"Li","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Jonathan M.","family":"McCune","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Advanced Micro Devices Inc. AMD I\/O virtualization technology (IOMMU) specification. Publication No. 34434 Revision: 1.26 Feb. 2009.  Advanced Micro Devices Inc. AMD I\/O virtualization technology (IOMMU) specification. Publication No. 34434 Revision: 1.26 Feb. 2009."},{"key":"e_1_3_2_1_2_1","volume-title":"System programming. Publication No. 24593, Revision: 3.17","author":"Devices Advanced Micro","year":"2010","unstructured":"Advanced Micro Devices , Inc. AMD 64 architecture programmer's manual volume 2 : System programming. Publication No. 24593, Revision: 3.17 , June 2010 . Advanced Micro Devices, Inc. AMD64 architecture programmer's manual volume 2: System programming. Publication No. 24593, Revision: 3.17, June 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_5_1","volume-title":"Black Hat","author":"Chen K.","year":"2009","unstructured":"K. Chen . Reversing and exploiting an Apple firmware update . In Black Hat , 2009 . K. Chen. Reversing and exploiting an Apple firmware update. In Black Hat, 2009."},{"key":"e_1_3_2_1_6_1","volume-title":"CanSecWest","author":"Duflot L.","year":"2011","unstructured":"L. Duflot , Y.-A. Perez , and B. Morin . Run-time firmware integrity verification: what if you can not trust your network card ? In CanSecWest , 2011 . L. Duflot, Y.-A. Perez, and B. Morin. Run-time firmware integrity verification: what if you can not trust your network card? In CanSecWest, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"CanSecWest","author":"Duflot L.","year":"2010","unstructured":"L. Duflot , Y.-A. Perez , G. Valadon , and O. Levillain . Can you still trust your network card ? CanSecWest , 2010 . L. Duflot, Y.-A. Perez, G. Valadon, and O. Levillain. Can you still trust your network card? CanSecWest, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A. Francillon C. Castelluccia D. Perito and C. Soriente. Comments on \"refutation of on the difficulty of software-based attestation of embedded devices\". http:\/\/planete.inrialpes.fr\/perito\/papers\/2010_CCS_attestation_comment%s_on_rebutal.pdf Oct. 2010.  A. Francillon C. Castelluccia D. Perito and C. Soriente. Comments on \"refutation of on the difficulty of software-based attestation of embedded devices\". http:\/\/planete.inrialpes.fr\/perito\/papers\/2010_CCS_attestation_comment%s_on_rebutal.pdf Oct. 2010.","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_4"},{"key":"e_1_3_2_1_10_1","volume-title":"802.3 Working Group","author":"IEEE Computer Society","year":"1997","unstructured":"IEEE Computer Society : 802.3 Working Group . IEEE standard 802.3x- 1997 , 1997. IEEE Computer Society: 802.3 Working Group. IEEE standard 802.3x-1997, 1997."},{"key":"e_1_3_2_1_11_1","unstructured":"A. N. Inc. Tigon Open Firmware. http:\/\/alteon.shareable.org.  A. N. Inc. Tigon Open Firmware. http:\/\/alteon.shareable.org."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/alteon.shareable.org","author":"A. N. Inc. Tigon\/PCI Ethernet Controlller (revision 1.04).","year":"1997","unstructured":"A. N. Inc. Tigon\/PCI Ethernet Controlller (revision 1.04). http:\/\/alteon.shareable.org , 1997 . A. N. Inc. Tigon\/PCI Ethernet Controlller (revision 1.04). http:\/\/alteon.shareable.org, 1997."},{"key":"e_1_3_2_1_13_1","volume-title":"Basic architecture. Order Number: 253665-073US","author":"Intel Corporation","year":"2011","unstructured":"Intel Corporation . Intel 64 and IA-32 architectures software developer's manual volume 1 : Basic architecture. Order Number: 253665-073US , Jan. 2011 . Intel Corporation. Intel 64 and IA-32 architectures software developer's manual volume 1: Basic architecture. Order Number: 253665-073US, Jan. 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Intel 64 and IA-32 architectures software developer's manual","author":"Intel Corporation","year":"2011","unstructured":"Intel Corporation . Intel 64 and IA-32 architectures software developer's manual volume 3b: System programming guide, part 2 . Order Number : 253669-037US, Jan. 2011 . Intel Corporation. Intel 64 and IA-32 architectures software developer's manual volume 3b: System programming guide, part 2. Order Number: 253669-037US, Jan. 2011."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Workshop on Hot Topics in Security (HotSec)","author":"Jakobsson M.","year":"2010","unstructured":"M. Jakobsson and K.-A. Johansson . Assured detection of malware with applications to mobile platforms . In Proceedings of the Workshop on Hot Topics in Security (HotSec) , Aug. 2010 . M. Jakobsson and K.-A. Johansson. Assured detection of malware with applications to mobile platforms. In Proceedings of the Workshop on Hot Topics in Security (HotSec), Aug. 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Kennell R.","year":"2003","unstructured":"R. Kennell and L. H. Jamieson . Establishing the genuinity of remote computer systems . In Proceedings of the USENIX Security Symposium , 2003 . R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In Proceedings of the USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875655"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_20_1","volume-title":"PCI Express System Architecture","author":"Mindshare Inc.","year":"2003","unstructured":"Mindshare Inc. , R. Budruk , D. Anderson , and T. Shanley . PCI Express System Architecture . Addison-Wesley Professional , Sept. 2003 . Mindshare Inc., R. Budruk, D. Anderson, and T. Shanley. PCI Express System Architecture. Addison-Wesley Professional, Sept. 2003."},{"key":"e_1_3_2_1_21_1","volume-title":"PCI System Architecture","author":"MindShare Inc.","year":"1999","unstructured":"MindShare Inc. , T. Shanley , and D. Anderson . PCI System Architecture ( 4 th Edition). Addison-Wesley Professional , June 1999 . MindShare Inc., T. Shanley, and D. Anderson. PCI System Architecture (4th Edition). Addison-Wesley Professional, June 1999.","edition":"4"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966477"},{"key":"e_1_3_2_1_23_1","volume-title":"Special Publication 800--57 Part","author":"NIST.","year":"2007","unstructured":"NIST. Recommendation for key management. Special Publication 800--57 Part 1, Mar. 2007 . NIST. Recommendation for key management. Special Publication 800--57 Part 1, Mar. 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"e_1_3_2_1_25_1","unstructured":"A. Perrig and L. van Doorn. Refutation of \"on the difficulty of software-based attestation of embedded devices\". http:\/\/sparrow.ece.cmu.edu\/group\/pub\/perrig-vandoorn-refutation.pdf 2010.  A. Perrig and L. van Doorn. Refutation of \"on the difficulty of software-based attestation of embedded devices\". http:\/\/sparrow.ece.cmu.edu\/group\/pub\/perrig-vandoorn-refutation.pdf 2010."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665798"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Symposium sur la S\u00e9curit\u00e9 des Technologies de L'Information et des Communications (SSTIC)","author":"Sang F. L.","year":"2011","unstructured":"F. L. Sang , V. Nicomette , Y. Deswarte , and L. Duflot . Attaques DMA peer-to-peer et contremesures . In Proceedings of the Symposium sur la S\u00e9curit\u00e9 des Technologies de L'Information et des Communications (SSTIC) , June 2011 . F. L. Sang, V. Nicomette, Y. Deswarte, and L. Duflot. Attaques DMA peer-to-peer et contremesures. In Proceedings of the Symposium sur la S\u00e9curit\u00e9 des Technologies de L'Information et des Communications (SSTIC), June 2011."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_3"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Shankar U.","year":"2004","unstructured":"U. Shankar , M. Chew , and J. Tygar . Side effects are not sufficient to authenticate software . In Proceedings of the USENIX Security Symposium , 2004 . U. Shankar, M. Chew, and J. Tygar. Side effects are not sufficient to authenticate software. In Proceedings of the USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353383"},{"key":"e_1_3_2_1_35_1","volume-title":"I Own the NIC, now I want a shell. In The 8th annual PacSec conference","author":"Triulzi A.","year":"2008","unstructured":"A. Triulzi . Project Maux Mk.II , I Own the NIC, now I want a shell. In The 8th annual PacSec conference , 2008 . A. Triulzi. Project Maux Mk.II, I Own the NIC, now I want a shell. In The 8th annual PacSec conference, 2008."},{"key":"e_1_3_2_1_36_1","volume-title":"The 12th annual CanSecWest conference","author":"Triulzi A.","year":"2010","unstructured":"A. Triulzi . The Jedi Packet takes over the Deathstar, taking NIC backdoor to the next level . In The 12th annual CanSecWest conference , 2010 . A. Triulzi. The Jedi Packet takes over the Deathstar, taking NIC backdoor to the next level. In The 12th annual CanSecWest conference, 2010."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894178"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046711"}},"subtitle":["verifying the integrity of PERipherals' firmware"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":35,"alternative-id":["10.1145\/2046707.2046711","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046711","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}