{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T03:21:30Z","timestamp":1771989690465,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2014EWT-EIRP002-040"],"award-info":[{"award-number":["NRF2014EWT-EIRP002-040"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Singapore's Agency for Science, Technology and Research (A*STAR)","award":["the Human-Centered Cyber-physical Systems Programme at the Advanced Digital Sciences Center"],"award-info":[{"award-number":["the Human-Centered Cyber-physical Systems Programme at the Advanced Digital Sciences Center"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134621","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"425-436","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors"],"prefix":"10.1145","author":[{"given":"Binbin","family":"Chen","sequence":"first","affiliation":[{"name":"Advanced Digital Sciences Center"}]},{"given":"Xinshu","family":"Dong","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center"}]},{"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology"}]},{"given":"Sumeet","family":"Jauhar","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center"}]},{"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Baidu USA XLab"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Stuxnet. https:\/\/en.wikipedia.org\/wiki\/Stuxnet.  Stuxnet. https:\/\/en.wikipedia.org\/wiki\/Stuxnet."},{"key":"e_1_3_2_1_2_1","volume-title":"Communication Delivery Time Performance Requirements for Electric Power Substation Automation","author":"IEEE","year":"2005","unstructured":"IEEE Standard 1646 , Communication Delivery Time Performance Requirements for Electric Power Substation Automation . 2005 . IEEE Standard 1646, Communication Delivery Time Performance Requirements for Electric Power Substation Automation. 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Black Hat Europe","author":"Abbasi Ali","year":"2016","unstructured":"Ali Abbasi and Majid Hashemi . Ghost in the plc: Designing an undetectable programmable logic controller rootkit . In Black Hat Europe , 2016 . Ali Abbasi and Majid Hashemi. Ghost in the plc: Designing an undetectable programmable logic controller rootkit. In Black Hat Europe, 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. ARM Developer Suite Assembler Guide - 4.3.1. Flexible second operand. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0068b\/CIHBEAGE.html.  ARM. ARM Developer Suite Assembler Guide - 4.3.1. Flexible second operand. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0068b\/CIHBEAGE.html."},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. Cortex-M Processor Family. http:\/\/www.arm.com\/products\/processors\/cortex-m\/index.php.  ARM. Cortex-M Processor Family. http:\/\/www.arm.com\/products\/processors\/cortex-m\/index.php."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. Trustzone. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/.  ARM. Trustzone. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/ics.sans.org\/blog\/2016\/01\/09\/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid","author":"Assante M.","year":"2016","unstructured":"M. Assante . Confirmation of a Coordinated Attack on the Ukrainian Power Grid . https:\/\/ics.sans.org\/blog\/2016\/01\/09\/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid , 2016 . M. Assante. Confirmation of a Coordinated Attack on the Ukrainian Power Grid. https:\/\/ics.sans.org\/blog\/2016\/01\/09\/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid, 2016."},{"key":"e_1_3_2_1_10_1","unstructured":"Atmel. SMART ARM Processor Based MCUs. http:\/\/www.atmel.com\/products\/microcontrollers\/ARM\/default.aspx.  Atmel. SMART ARM Processor Based MCUs. http:\/\/www.atmel.com\/products\/microcontrollers\/ARM\/default.aspx."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"e_1_3_2_1_12_1","unstructured":"Belden. SPIDER II Unmanaged Switches. https:\/\/www.belden.com\/products\/industrialnetworking\/unmanagedswitches\/spider-2.cfm.  Belden. SPIDER II Unmanaged Switches. https:\/\/www.belden.com\/products\/industrialnetworking\/unmanagedswitches\/spider-2.cfm."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_14_1","volume-title":"NDSS","author":"Cui A.","year":"2013","unstructured":"A. Cui , M. Costello , and S. Stolfo . When firmware modifications attack: A case study of embedded exploitation . In NDSS , 2013 . A. Cui, M. Costello, and S. Stolfo. When firmware modifications attack: A case study of embedded exploitation. In NDSS, 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"NDSS","author":"Defrawy K. E.","year":"2012","unstructured":"K. E. Defrawy , A. Francillon , D. Perito , and G. Tsudik . SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust . NDSS , 2012 . K. E. Defrawy, A. Francillon, D. Perito, and G. Tsudik. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. NDSS, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616606.2616905"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368518"},{"key":"e_1_3_2_1_19_1","unstructured":"Delta Group. Svg2000 series. http:\/\/www.deltaww.com\/products\/CategoryListT1.aspx?CID=060503&PID=761&hl=en-us&Name=SVG2000%20Series.  Delta Group. Svg2000 series. http:\/\/www.deltaww.com\/products\/CategoryListT1.aspx?CID=060503&PID=761&hl=en-us&Name=SVG2000%20Series."},{"key":"e_1_3_2_1_20_1","unstructured":"IEC. Internal standard 60870-5-104. https:\/\/webstore.iec.ch\/preview\/info_iec60870-5-104%7Bed2.0%7Den_d.pdf.  IEC. Internal standard 60870-5-104. https:\/\/webstore.iec.ch\/preview\/info_iec60870-5-104%7Bed2.0%7Den_d.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"Texas Instruments. Smart grid leverages ARM-based solutions to enable intelligent power consumption with a more robust end-to-end communication network.  Texas Instruments. Smart grid leverages ARM-based solutions to enable intelligent power consumption with a more robust end-to-end communication network."},{"key":"e_1_3_2_1_22_1","unstructured":"Intel. Trusted compute pools with intel\u00ae trusted execution technology. http:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/malware-reduction-general-technology.html.  Intel. Trusted compute pools with intel\u00ae trusted execution technology. http:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/malware-reduction-general-technology.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"key":"e_1_3_2_1_24_1","unstructured":"Sandia National Laboratories. Control System Devices: Architectures and Supply Channels Overview. http:\/\/energy.sandia.gov\/wp-content\/gallery\/uploads\/JCSW_Report_Final.pdf.  Sandia National Laboratories. Control System Devices: Architectures and Supply Channels Overview. http:\/\/energy.sandia.gov\/wp-content\/gallery\/uploads\/JCSW_Report_Final.pdf."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26096-9_7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1884848.1884851"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"e_1_3_2_1_28_1","unstructured":"A. McDiarmid. ARM immediate value encoding. http:\/\/alisdair.mcdiarmid.org\/arm-immediate-value-encoding\/ 2014.  A. McDiarmid. ARM immediate value encoding. http:\/\/alisdair.mcdiarmid.org\/arm-immediate-value-encoding\/ 2014."},{"key":"e_1_3_2_1_29_1","unstructured":"Moxa. EDS-205\/EDS-208 Series. http:\/\/www.moxa.com\/product\/EDS-208205.htm.  Moxa. EDS-205\/EDS-208 Series. http:\/\/www.moxa.com\/product\/EDS-208205.htm."},{"key":"e_1_3_2_1_30_1","unstructured":"NXP. Lpc 1756. www.nxp.com\/documents\/data_sheet\/LPC1759_58_56_54_52_51.pdf.  NXP. Lpc 1756. www.nxp.com\/documents\/data_sheet\/LPC1759_58_56_54_52_51.pdf."},{"key":"e_1_3_2_1_31_1","unstructured":"NXP. Lpc 2292. www.nxp.com\/documents\/data_sheet\/LPC2292_2294.pdf.  NXP. Lpc 2292. www.nxp.com\/documents\/data_sheet\/LPC2292_2294.pdf."},{"key":"e_1_3_2_1_32_1","volume-title":"SCADA Security Scientific Symposium","author":"Peck D.","year":"2009","unstructured":"D. Peck and D. Peterson . Leveraging ethernet card vulnerabilities in field devices . In SCADA Security Scientific Symposium , 2009 . D. Peck and D. Peterson. Leveraging ethernet card vulnerabilities in field devices. In SCADA Security Scientific Symposium, 2009."},{"key":"e_1_3_2_1_33_1","volume-title":"April","author":"Perrig Adrian","year":"2010","unstructured":"Adrian Perrig and Leendert van Doorn . Refutation of\"on the difficulty of software-based attestation of embedded devices \", April 2010 . Adrian Perrig and Leendert van Doorn. Refutation of\"on the difficulty of software-based attestation of embedded devices\", April 2010."},{"key":"e_1_3_2_1_34_1","volume-title":"Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks. Technical report","author":"Seshadri A.","year":"2004","unstructured":"A. Seshadri , M. Luk , A. Perrig , L. Van Doorn , and P. Khosla . Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks. Technical report , Carnegie Mellon University , December 2004 . A. Seshadri, M. Luk, A. Perrig, L. Van Doorn, and P. Khosla. Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks. Technical report, Carnegie Mellon University, December 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_37_1","volume-title":"SWATT: software-based attestation for embedded devices","author":"Seshadri A.","year":"2004","unstructured":"A. Seshadri , A. Perrig , L. van Doorn , and P. Khosla . SWATT: software-based attestation for embedded devices . IEEE S &P, 2004 . A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: software-based attestation for embedded devices. IEEE S&P, 2004."},{"key":"e_1_3_2_1_38_1","volume-title":"CPS-CA","author":"Shah A.","year":"2008","unstructured":"A. Shah , A. Perrig , and B. Sinopoli . Mechanisms to Provide Integrity in SCADA and PCS devices . CPS-CA , 2008 . A. Shah, A. Perrig, and B. Sinopoli. Mechanisms to Provide Integrity in SCADA and PCS devices. CPS-CA, 2008."},{"key":"e_1_3_2_1_39_1","volume-title":"Black Hat Asia","author":"Spenneberg R.","year":"2016","unstructured":"R. Spenneberg , M. Bruggemann , and H. Schwartke . PLC-blaster: A worm living solely in the PLC . In Black Hat Asia , 2016 . R. Spenneberg, M. Bruggemann, and H. Schwartke. PLC-blaster: A worm living solely in the PLC. In Black Hat Asia, 2016."},{"key":"e_1_3_2_1_40_1","volume-title":"Malnets: Largescale malicious networks via compromised wireless access points. 3(2-3):102--113","author":"Traynor P.","year":"2010","unstructured":"P. Traynor , K. Butler , W. Enck , P. McDaniel , and K. Borders . Malnets: Largescale malicious networks via compromised wireless access points. 3(2-3):102--113 , 2010 . P. Traynor, K. Butler, W. Enck, P. McDaniel, and K. Borders. Malnets: Largescale malicious networks via compromised wireless access points. 3(2-3):102--113, 2010."},{"key":"e_1_3_2_1_41_1","unstructured":"WIZnet. http:\/\/www.wiznet.co.kr\/product-item\/w5100\/.  WIZnet. http:\/\/www.wiznet.co.kr\/product-item\/w5100\/."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":40,"alternative-id":["10.1145\/3134600.3134621","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134621","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}