{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:25:38Z","timestamp":1775067938453,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea government (MSIP)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3019612.3019738","type":"proceedings-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T16:27:32Z","timestamp":1495729652000},"page":"1528-1533","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Quantitative analysis of measurement overhead for integrity verification"],"prefix":"10.1145","author":[{"given":"Juhyung","family":"Son","sequence":"first","affiliation":[{"name":"Dankook University, Yongin, Republic of Korea"}]},{"given":"Sungmin","family":"Koo","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Republic of Korea"}]},{"given":"Jongmoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Republic of Korea"}]},{"given":"Seong-je","family":"Choi","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Republic of Korea"}]},{"given":"Seungjae","family":"Baek","sequence":"additional","affiliation":[{"name":"KIOST(Korea Institute of Ocean Science &amp; Technology), Ansan, Republic of Korea"}]},{"given":"Gwangil","family":"Jeon","sequence":"additional","affiliation":[{"name":"Korea Polytechnic University, Siheung, Republic of Korea"}]},{"given":"Jun-Hyeok","family":"Park","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]},{"given":"Hyoungchun","family":"Kim","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security","author":"Sailer R.","year":"2004","unstructured":"Sailer , R. , Zhang , X. , Jaeger , T. , and Doom , L. V . Design and Implementation of a TCG-based Integrity Measurement Architecture , USENIX Security , 2004 . Sailer, R., Zhang, X., Jaeger, T., and Doom, L. V. Design and Implementation of a TCG-based Integrity Measurement Architecture, USENIX Security, 2004."},{"key":"e_1_3_2_1_2_1","unstructured":"Linux IMA In Overview of the Linux Integrity Subsystem https:\/\/sourceforge.net\/projects\/linux-ima\/files\/linux-ima\/Integrity_overview.pdf\/download?use_mirror=heanet  Linux IMA In Overview of the Linux Integrity Subsystem https:\/\/sourceforge.net\/projects\/linux-ima\/files\/linux-ima\/Integrity_overview.pdf\/download?use_mirror=heanet"},{"key":"e_1_3_2_1_3_1","volume-title":"IBM","author":"Safford D.","year":"2011","unstructured":"Safford , D. , and Zohar , M . An Overview of the Linux Integrity Architecture , IBM , 2011 . Safford, D., and Zohar, M. An Overview of the Linux Integrity Architecture, IBM, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"MSE Project Report","author":"Choinyambuu S.","year":"2011","unstructured":"Choinyambuu , S. A Root of Trust for Measurement , MSE Project Report , 2011 . Choinyambuu, S. A Root of Trust for Measurement, MSE Project Report, 2011."},{"key":"e_1_3_2_1_5_1","unstructured":"Trusted Computing Group www.trustedcomputinggroup.org.  Trusted Computing Group www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_6_1","volume":"200","author":"Safford D.","unstructured":"Safford , D. , Zohar , M. , and Sailer , R. Using IMA for Integrity Measurement and Attestation, IBM T. J. Watson Research Center , 200 9. Safford, D., Zohar, M., and Sailer, R. Using IMA for Integrity Measurement and Attestation, IBM T.J. Watson Research Center, 2009.","journal-title":"J. Watson Research Center"},{"key":"e_1_3_2_1_7_1","volume-title":"LinuxCon Europe","author":"Kasatkin D.","year":"2013","unstructured":"Kasatkin , D. Integrity Protection Solutions in Linux , LinuxCon Europe , 2013 . Kasatkin, D. Integrity Protection Solutions in Linux, LinuxCon Europe, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030125"},{"key":"e_1_3_2_1_9_1","volume-title":"Linux Security Summit","author":"Steffen A.","year":"2012","unstructured":"Steffen , A. , The Linux Integrity Measurement Architecture and TPM-based Network Endpoint Assessment , Linux Security Summit , 2012 . Steffen, A., The Linux Integrity Measurement Architecture and TPM-based Network Endpoint Assessment, Linux Security Summit, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0085"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_12_1","volume-title":"TKK Seminar on Network Security","author":"Nie C.","year":"2007","unstructured":"Nie , C. Dynamic Root of Tmst in Trusted Computing , TKK Seminar on Network Security , 2007 Nie, C. Dynamic Root of Tmst in Trusted Computing, TKK Seminar on Network Security, 2007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"}],"event":{"name":"SAC 2017: Symposium on Applied Computing","location":"Marrakech Morocco","acronym":"SAC 2017","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3019612.3019738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:40Z","timestamp":1750215820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":13,"alternative-id":["10.1145\/3019612.3019738","10.1145\/3019612"],"URL":"https:\/\/doi.org\/10.1145\/3019612.3019738","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}