{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T05:14:30Z","timestamp":1772255670717,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1702911"],"award-info":[{"award-number":["1702911"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-16-1-0536"],"award-info":[{"award-number":["W911NF-16-1-0536"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196526","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"313-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security"],"prefix":"10.1145","author":[{"given":"Xavier","family":"Carpent","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Karim","family":"Eldefrawy","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Norrathep","family":"Rattanavipanon","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898083"},{"key":"e_1_3_2_1_4_1","volume-title":"Remote Attestation of IoT Devices via SMARM: Shuffled Measurements Against Roving Malware IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","author":"Carpent Xavier","year":"2018","unstructured":"Xavier Carpent , Norrathep Rattanavipanon , and Gene Tsudik . 2018. Remote Attestation of IoT Devices via SMARM: Shuffled Measurements Against Roving Malware IEEE International Symposium on Hardware Oriented Security and Trust (HOST) , 2018 . Xavier Carpent, Norrathep Rattanavipanon, and Gene Tsudik. 2018. Remote Attestation of IoT Devices via SMARM: Shuffled Measurements Against Roving Malware IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats.","author":"Chien Eric","year":"2012","unstructured":"Eric Chien , Liam O Murchu , and Nicolas Falliere . 2012 . W32.Duqu: The Precursor to the Next Stuxnet . In Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. Eric Chien, Liam OMurchu, and Nicolas Falliere. 2012. W32.Duqu: The Precursor to the Next Stuxnet. In Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats."},{"key":"e_1_3_2_1_7_1","unstructured":"Hardkernel co. Ltd. 2013. ODROID-XU4. (2013). http:\/\/www.hardkernel.com\/main\/products\/prdt_info.php?g_code=G143452239825  Hardkernel co. Ltd. 2013. ODROID-XU4. (2013). http:\/\/www.hardkernel.com\/main\/products\/prdt_info.php?g_code=G143452239825"},{"key":"e_1_3_2_1_8_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptology ePrint Archive ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/boundarydevices.com\/product\/sabre-lite-imx6-sbc\/","author":"Devices Boundary","year":"2017","unstructured":"Boundary Devices . 2017. BD-SL-I.MX6. ( 2017 ). https:\/\/boundarydevices.com\/product\/sabre-lite-imx6-sbc\/ Boundary Devices. 2017. BD-SL-I.MX6. (2017). https:\/\/boundarydevices.com\/product\/sabre-lite-imx6-sbc\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098261"},{"key":"e_1_3_2_1_11_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust Network and Distributed System Security Symposium (NDSS).","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy , Gene Tsudik , Aur\u00e9lien Francillon , and Daniele Perito . 2012 . SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust Network and Distributed System Security Symposium (NDSS). Karim Eldefrawy, Gene Tsudik, Aur\u00e9lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_12_1","unstructured":"F-Secure. 2018 a. Brain Description. (2018). https:\/\/www.f-secure.com\/v-descs\/brain.shtml  F-Secure. 2018 a. Brain Description. (2018). https:\/\/www.f-secure.com\/v-descs\/brain.shtml"},{"key":"e_1_3_2_1_13_1","unstructured":"F-Secure. 2018 b. Cabanas Description. (2018). https:\/\/www.f-secure.com\/v-descs\/cabanas.shtml  F-Secure. 2018 b. Cabanas Description. (2018). https:\/\/www.f-secure.com\/v-descs\/cabanas.shtml"},{"key":"e_1_3_2_1_14_1","unstructured":"F-Secure. 2018 c. Frodo Description. (2018). https:\/\/www.f-secure.com\/v-descs\/frodo.shtml  F-Secure. 2018 c. Frodo Description. (2018). https:\/\/www.f-secure.com\/v-descs\/frodo.shtml"},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted Computing Group.. 2017. Trusted Platform Module (TPM). (2017). http:\/\/www.trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/  Trusted Computing Group.. 2017. Trusted Platform Module (TPM). (2017). http:\/\/www.trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/"},{"key":"e_1_3_2_1_16_1","unstructured":"SANS Institute. 2014. Securing the Internet of Things Survey. (2014). https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/securing-internet-things-survey-34785  SANS Institute. 2014. Securing the Internet of Things Survey. (2014). https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/securing-internet-things-survey-34785"},{"key":"e_1_3_2_1_17_1","unstructured":"ISO\/IEC. 2011. Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher. Standard. ISO.  ISO\/IEC. 2011. Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher. Standard. ISO."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_20_1","unstructured":"Ralph Langner. 2013. To Kill a Centrifuge a Technical Analysis of What Stuxnet's Creators Tried to Achieve. (2013).  Ralph Langner. 2013. To Kill a Centrifuge a Technical Analysis of What Stuxnet's Creators Tried to Achieve. (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_22_1","volume-title":"43rd International Colloquium on Automata, Languages, and Programming, ICALP.","author":"Lipton Richard J.","year":"2016","unstructured":"Richard J. Lipton , Rafail Ostrovsky , and Vassilis Zikas . 2016 . Provably Secure Virus Detection: Using The Observer Effect Against Malware 43rd International Colloquium on Automata, Languages, and Programming, ICALP. Richard J. Lipton, Rafail Ostrovsky, and Vassilis Zikas. 2016. Provably Secure Virus Detection: Using The Observer Effect Against Malware 43rd International Colloquium on Automata, Languages, and Programming, ICALP."},{"key":"e_1_3_2_1_23_1","volume-title":"https:\/\/www.arm.com\/products\/security-on-arm\/trustzone","author":"Ltd ARM","year":"2017","unstructured":"ARM Ltd .. 2017. ARM TrustZone . ( 2017 ). https:\/\/www.arm.com\/products\/security-on-arm\/trustzone ARM Ltd.. 2017. ARM TrustZone. (2017). https:\/\/www.arm.com\/products\/security-on-arm\/trustzone"},{"key":"e_1_3_2_1_24_1","unstructured":"LWN.net. 2018. DR rootkit released under the GPL. (2018). https:\/\/lwn.net\/Articles\/297775\/  LWN.net. 2018. DR rootkit released under the GPL. (2018). https:\/\/lwn.net\/Articles\/297775\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Wired Magazine. 201"},{"key":"e_1_3_2_1_26_1","unstructured":"National ICT Australia and other contributors. 2014 a. seL4 Libraries. (2014). https:\/\/github.com\/seL4\/seL4_libs  National ICT Australia and other contributors. 2014 a. seL4 Libraries. (2014). https:\/\/github.com\/seL4\/seL4_libs"},{"key":"e_1_3_2_1_27_1","unstructured":"National ICT Australia and other contributors. 2014 b. The seL4 Repository. (2014). https:\/\/github.com\/seL4\/seL4  National ICT Australia and other contributors. 2014 b. The seL4 Repository. (2014). https:\/\/github.com\/seL4\/seL4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Daniele Perito and Gene Tsudik. 2010. Secure Code Update for Embedded Devices via Proofs of Secure Erasure. ESORICS.   Daniele Perito and Gene Tsudik. 2010. Secure Code Update for Embedded Devices via Proofs of Secure Erasure. ESORICS.","DOI":"10.1007\/978-3-642-15497-3_39"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_30_1","volume-title":"Mitigation Measures, and Steps Toward Autonomous Open World Solutions","author":"Rudd Ethan M","year":"2017","unstructured":"Ethan M Rudd , Andras Rozsa , Manuel G\u00fcnther , and Terrance E Boult . 2017. A Survey of Stealth Malware Attacks , Mitigation Measures, and Steps Toward Autonomous Open World Solutions . IEEE Communications Surveys & Tutorials ( 2017 ). Ethan M Rudd, Andras Rozsa, Manuel G\u00fcnther, and Terrance E Boult. 2017. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Communications Surveys & Tutorials (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_35_1","volume-title":"Leendert Van Doorn, and Pradeep Khosla","author":"Seshadri Arvind","year":"2004","unstructured":"Arvind Seshadri , Adrian Perrig , Leendert Van Doorn, and Pradeep Khosla . 2004 . SWATT : Software-based attestation for embedded devices IEEE Symposium on Research in Security and Privacy (S &P). Arvind Seshadri, Adrian Perrig, Leendert Van Doorn, and Pradeep Khosla. 2004. SWATT: Software-based attestation for embedded devices IEEE Symposium on Research in Security and Privacy (S&P)."},{"key":"e_1_3_2_1_36_1","unstructured":"IEEE Spectrum. 2013. The Real Story of Stuxnet. (2013). http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet  IEEE Spectrum. 2013. The Real Story of Stuxnet. (2013). http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet"},{"key":"e_1_3_2_1_37_1","first-page":"180","volume":"200","unstructured":"Secure Hash Standard. 200 2. FIPS PUB 180 -- 182 . (2002). Secure Hash Standard. 2002. FIPS PUB 180--2. (2002).","journal-title":"Secure Hash Standard."},{"key":"e_1_3_2_1_38_1","unstructured":"Frederic Stumpf Omid Tafreschi Patrick R\u00f6der and Claudia Eckert. 2006. A Robust Integrity Reporting Protocol for Remote Attestation Workshop on Advances in Trusted Computing (WATC).  Frederic Stumpf Omid Tafreschi Patrick R\u00f6der and Claudia Eckert. 2006. A Robust Integrity Reporting Protocol for Remote Attestation Workshop on Advances in Trusted Computing (WATC)."},{"key":"e_1_3_2_1_39_1","unstructured":"Symantec. 2015. GreenDispencer: Self-deleting Malware. (2015). https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2015-092513-0300-99  Symantec. 2015. GreenDispencer: Self-deleting Malware. (2015). https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2015-092513-0300-99"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.126"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196526","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":39,"alternative-id":["10.1145\/3196494.3196526","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196526","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}