{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:59Z","timestamp":1750220099858,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information communications Technology Planning Evaluation","award":["2021-0-02107"],"award-info":[{"award-number":["2021-0-02107"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["192241"],"award-info":[{"award-number":["192241"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3529653","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"285-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Code Assurance Proof for Wireless Software"],"prefix":"10.1145","author":[{"given":"Theo","family":"Gamboni-Diehl","sequence":"first","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"Simeon","family":"Wuthier","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"Jinoh","family":"Kim","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Jonghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"given":"Sang-Yoon","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467818"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2693990"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348556"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4300983"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. Telecommunications Policy Research Conference (TPRC).","author":"Horne William D","year":"2003","unstructured":"William D Horne . 2003 . Adaptive spectrum access: Using the full spectrum space . In Proc. Telecommunications Policy Research Conference (TPRC). William D Horne. 2003. Adaptive spectrum access: Using the full spectrum space. In Proc. Telecommunications Policy Research Conference (TPRC)."},{"volume-title":"Secure commu- nications and asymmetric cryptosystems","author":"Merkle Ralph C","key":"e_1_3_2_1_9_1","unstructured":"Ralph C Merkle . 2019. Protocols for public key cryptosystems . In Secure commu- nications and asymmetric cryptosystems . Routledge , 73--104. Ralph C Merkle. 2019. Protocols for public key cryptosystems. In Secure commu- nications and asymmetric cryptosystems. Routledge, 73--104."},{"volume-title":"13th USENIX Security Symposium (USENIX Security 04). USENIX Associa- tion","author":"Sailer Reiner","key":"e_1_3_2_1_10_1","unstructured":"Reiner Sailer , Xiaolan Zhang , Trent Jaeger , and Leendert van Doorn . 2004. De- sign and Implementation of a TCG-based Integrity Measurement Architecture . In 13th USENIX Security Symposium (USENIX Security 04). USENIX Associa- tion , San Diego, CA . https:\/\/www.usenix.org\/conference\/13th-usenix-security- symposium\/design-and-implementation-tcg-based-integrity-measurement Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. 2004. De- sign and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Associa- tion, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security- symposium\/design-and-implementation-tcg-based-integrity-measurement"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131120"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467819"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"San Antonio TX USA","acronym":"WiSec '22"},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3507657.3529653","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3529653","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3529653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":13,"alternative-id":["10.1145\/3507657.3529653","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3529653","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}