{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:17:59Z","timestamp":1758125879622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T00:00:00Z","timestamp":1657411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,10]]},"DOI":"10.1145\/3489517.3530550","type":"proceedings-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T23:19:29Z","timestamp":1661296769000},"page":"721-726","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["ASAP"],"prefix":"10.1145","author":[{"given":"Adam","family":"Caulfield","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Norrathep","family":"Rattanavipanon","sequence":"additional","affiliation":[{"name":"Prince Songkla University"}]},{"given":"Ivan","family":"De Oliveira Nunes","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"ASAP source code \" https:\/\/github.com\/RIT-CHAOS-SEC\/ASAP."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_3_1","unstructured":"Arm Ltd. \"Arm TrustZone \" 2018. [Online]. Available: https:\/\/www.arm.com\/products\/security-on-arm\/trustzone"},{"key":"e_1_3_2_1_4_1","volume-title":"ACM","author":"Brasser F.","year":"2015","unstructured":"F. Brasser et al., \"Tytan: Tiny trust anchor for tiny devices,\" in DAC. ACM, 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"ERASMUS: Efficient remote attestation via self-measurement for unattended settings,\" in DATE","author":"Carpent X.","year":"2018","unstructured":"X. Carpent et al., \"ERASMUS: Efficient remote attestation via self-measurement for unattended settings,\" in DATE, 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"Reconciling remote attestation and safety-critical operation on simple iot devices,\" in DAC","author":"Carpent X.","year":"2018","unstructured":"X. Carpent et al., \"Reconciling remote attestation and safety-critical operation on simple iot devices,\" in DAC, 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Remote attestation of iot devices via SMARM: Shuffled measurements against roving malware,\" in IEEE HOST","author":"Carpent X.","year":"2018","unstructured":"X. Carpent et al., \"Remote attestation of iot devices via SMARM: Shuffled measurements against roving malware,\" in IEEE HOST, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Nusmv 2: An opensource tool for symbolic model checking,\" in CAV","author":"Cimatti A.","year":"2002","unstructured":"A. Cimatti et al., \"Nusmv 2: An opensource tool for symbolic model checking,\" in CAV, 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"Sanctum: Minimal hardware extensions for strong software isolation,\" in {USENIX} Security","author":"Costan V.","year":"2016","unstructured":"V. Costan et al., \"Sanctum: Minimal hardware extensions for strong software isolation,\" in {USENIX} Security, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"VRASED: A verified hardware\/software co-design for remote attestation,\" USENIX Security","author":"De Oliveira Nunes I.","year":"2019","unstructured":"I. De Oliveira Nunes et al., \"VRASED: A verified hardware\/software co-design for remote attestation,\" USENIX Security, 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"APEX: A verified architecture for proofs of execution on remote devices under full software compromise,\" in USENIX Security","author":"De Oliveira Nunes I.","year":"2020","unstructured":"I. De Oliveira Nunes et al., \"APEX: A verified architecture for proofs of execution on remote devices under full software compromise,\" in USENIX Security, 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"Dialed: Data integrity attestation for low-end embedded devices,\" DAC","author":"De Oliveira Nunes I.","year":"2021","unstructured":"I. De Oliveira Nunes et al., \"Dialed: Data integrity attestation for low-end embedded devices,\" DAC, 2021."},{"key":"e_1_3_2_1_13_1","volume-title":"On the toctou problem in remote attestation,\" in ACM CCS","author":"De Oliveira Nunes I.","year":"2021","unstructured":"I. De Oliveira Nunes et al., \"On the toctou problem in remote attestation,\" in ACM CCS, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Tiny-cfa: A minimalistic approach for control flow attestation using verified proofs of execution.\" in DATE","author":"De Oliveira Nunes I.","year":"2021","unstructured":"I. De Oliveira Nunes et al., \"Tiny-cfa: A minimalistic approach for control flow attestation using verified proofs of execution.\" in DATE, 2021."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062276"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240821"},{"key":"e_1_3_2_1_17_1","volume-title":"Smart: Secure and minimal architecture for (establishing dynamic) root of trust,\" in NDSS","author":"Eldefrawy K.","year":"2012","unstructured":"K. Eldefrawy et al., \"Smart: Secure and minimal architecture for (establishing dynamic) root of trust,\" in NDSS, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"SeED: secure non-interactive attestation for embedded devices,\" in ACM WiSec","author":"Ibrahim A.","year":"2017","unstructured":"A. Ibrahim et al., \"SeED: secure non-interactive attestation for embedded devices,\" in ACM WiSec, 2017."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel \"Intel Software Guard Extensions (Intel SGX).\" [Online]. Available: https:\/\/software.intel.com\/en-us\/sgx"},{"key":"e_1_3_2_1_20_1","volume-title":"Design and implementation of low cost smart syringe pump for telemedicine and healthcare,\" in ICREST","author":"Islam M. R.","year":"2019","unstructured":"M. R. Islam et al., \"Design and implementation of low cost smart syringe pump for telemedicine and healthcare,\" in ICREST, 2019."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2700550"},{"key":"e_1_3_2_1_22_1","volume-title":"Establishing the genuinity of remote computer systems,\" in USENIX Security","author":"Kennell R.","year":"2003","unstructured":"R. Kennell et al., \"Establishing the genuinity of remote computer systems,\" in USENIX Security, 2003."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_24_1","volume-title":"New results for timing-based attestation,\" in IEEE S&P '12","author":"Kovah X.","year":"2012","unstructured":"X. Kovah et al., \"New results for timing-based attestation,\" in IEEE S&P '12, 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"A survey of remote attestation in internet of things: Attacks, countermeasures, and prospects,\" Computers & Security","author":"Kuang B.","year":"2022","unstructured":"B. Kuang et al., \"A survey of remote attestation in internet of things: Attacks, countermeasures, and prospects,\" Computers & Security, 2022."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_27_1","volume-title":"Copilot --- A coprocessor-based kernel runtime integrity monitor,\" in USENIX Security","author":"Petroni J.","year":"2004","unstructured":"J. Petroni et al., \"Copilot --- A coprocessor-based kernel runtime integrity monitor,\" in USENIX Security, 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"Programming","author":"Schellekens D.","year":"2008","unstructured":"D. Schellekens et al., \"Remote attestation on legacy operating systems with trusted platform modules,\" Science of Comp. Programming, 2008."},{"key":"e_1_3_2_1_29_1","volume-title":"SWATT: Software-based attestation for embedded devices,\" in IEEE S&P '04","author":"Seshadri A.","year":"2004","unstructured":"A. Seshadri et al., \"SWATT: Software-based attestation for embedded devices,\" in IEEE S&P '04, 2004."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_31_1","volume-title":"SAKE: software attestation for key establishment in sensor networks,\" in DCOSS","author":"Seshadri A.","year":"2008","unstructured":"A. Seshadri et al., \"SAKE: software attestation for key establishment in sensor networks,\" in DCOSS, 2008."},{"key":"e_1_3_2_1_32_1","volume-title":"Oat: Attesting operation integrity of embedded devices,\" in IEEE S&P","author":"Sun Z.","year":"2020","unstructured":"Z. Sun et al., \"Oat: Attesting operation integrity of embedded devices,\" in IEEE S&P, 2020."},{"key":"e_1_3_2_1_33_1","unstructured":"TCG \"Trusted platform module (tpm) \" 2017. [Online]. Available: http:\/\/www.trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/"}],"event":{"name":"DAC '22: 59th ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA"],"location":"San Francisco California","acronym":"DAC '22"},"container-title":["Proceedings of the 59th ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489517.3530550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3489517.3530550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:18Z","timestamp":1750186938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489517.3530550"}},"subtitle":["reconciling asynchronous real-time operations and proofs of execution in simple embedded systems"],"short-title":[],"issued":{"date-parts":[[2022,7,10]]},"references-count":33,"alternative-id":["10.1145\/3489517.3530550","10.1145\/3489517"],"URL":"https:\/\/doi.org\/10.1145\/3489517.3530550","relation":{},"subject":[],"published":{"date-parts":[[2022,7,10]]},"assertion":[{"value":"2022-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}