{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:09Z","timestamp":1750309509019,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["SATC-1956393","H98230-22-1-0308"],"award-info":[{"award-number":["SATC-1956393","H98230-22-1-0308"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,6]]},"DOI":"10.1145\/3715014.3722057","type":"proceedings-article","created":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T23:37:21Z","timestamp":1746401841000},"page":"88-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TOCTOU Resilient Attestation for IoT Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6076-9942","authenticated-orcid":false,"given":"Pavel","family":"Frolikov","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9287-2663","authenticated-orcid":false,"given":"Youngil","family":"Kim","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0502-6780","authenticated-orcid":false,"given":"Renascence Tarafder","family":"Prapty","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8467-8614","authenticated-orcid":false,"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS.","author":"Abera Tigist","year":"2019","unstructured":"Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter. 2019. DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.. In NDSS."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582812"},{"key":"e_1_3_2_1_3_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Aliaj Esmerald","year":"2022","unstructured":"Esmerald Aliaj, Ivan De Oliveira Nunes, and Gene Tsudik. 2022. {GAROTA}: generalized active {Root-Of-Trust} architecture (for tiny embedded devices). In 31st USENIX Security Symposium (USENIX Security 22)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_5_1","volume-title":"IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. In 31th Annual Network and Distributed System Security Symposium, NDSS","author":"Arkannezhad Fatemeh","year":"2024","unstructured":"Fatemeh Arkannezhad, Justin Feng, and Nader Sehatbakhsh. 2024. IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. In 31th Annual Network and Distributed System Security Symposium, NDSS 2024."},{"key":"e_1_3_2_1_6_1","unstructured":"Arm Ltd. 2018. Arm TrustZone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898083"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053010"},{"key":"e_1_3_2_1_11_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Guoxing","year":"2022","unstructured":"Guoxing Chen and Yinqian Zhang. 2022. {MAGE}: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. In 31st USENIX Security Symposium (USENIX Security 22)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354220"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549450"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484532"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory (1983).","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_17_1","volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS.","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy, Gene Tsudik, Aur\u00e9lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. In NDSS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"volume-title":"15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21).","author":"Feng Erhu","key":"e_1_3_2_1_19_1","unstructured":"Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable memory protection in the {PENGLAI} enclave. In 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21)."},{"key":"e_1_3_2_1_20_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Ghaeini Hamid Reza","year":"2019","unstructured":"Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, and Saman Zonouz. 2019. {PAtt}: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098260"},{"key":"e_1_3_2_1_23_1","unstructured":"Intel. [n.d.]. Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/en-us\/sgx\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1156--1159","author":"Irfan Ahmed","year":"2016","unstructured":"Ahmed Irfan, Alessandro Cimatti, Alberto Griggio, Marco Roveri, and Roberto Sebastiani. 2016. Verilog2SMV: A tool for word-level verification. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1156--1159."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"J. Protzenko J.-K. Zinzindohou\u00e9 K. Bhargavan and B. Beurdouche. 2017. \"Hacl*: A verified modern cryptographic library In \"Hacl*: A verified modern cryptographic library. CCS.","DOI":"10.1145\/3133956.3134043"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623089"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Patrick Koeberl Steffen Schulz Ahmad-Reza Sadeghi and Vijay Varadharajan. 2014. TrustLite: A security architecture for tiny embedded devices. In EuroSys.","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098255"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196544"},{"key":"e_1_3_2_1_30_1","volume-title":"ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms","author":"Kuang Boyu","year":"2019","unstructured":"Boyu Kuang, Anmin Fu, Shui Yu, Guomin Yang, Mang Su, and Yuqing Zhang. 2019. ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms. IEEE Internet of Things Journal (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Leslie Lamport. 1981. Password Authentication with Insecure Communication. In Communications of the ACM 24.11.","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_33_1","volume-title":"Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes. Journal of Systems Architecture","author":"Ling Zhen","year":"2021","unstructured":"Zhen Ling, Huaiyu Yan, Xinhui Shao, Junzhou Luo, Yiling Xu, Bryan Pearson, and Xinwen Fu. 2021. Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes. Journal of Systems Architecture (2021)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2018.8460440"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/530225"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Rajani Muraleedharan and Lisa Ann Osadciw. 2006. Jamming attack detection and countermeasures in wireless sensor network using ant system. In Wireless Sensing and Processing.","DOI":"10.1117\/12.666330"},{"key":"e_1_3_2_1_38_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Noorman Job","year":"2013","unstructured":"Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd USENIX Security Symposium (USENIX Security 13)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00120"},{"key":"e_1_3_2_1_40_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Oliveira Nunes Ivan De","year":"2019","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. {VRASED}: A verified {Hardware\/Software}{Co-Design} for remote attestation. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_1_41_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oliveira Nunes Ivan De","year":"2020","unstructured":"Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, and Gene Tsudik. 2020. {APEX}: A verified architecture for proofs of execution on remote devices under full software compromise. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_42_1","volume-title":"The past, present, and future of physical security enclosures: from battery-backed monitoring to puf-based inherent security and beyond. Journal of hardware and systems security","author":"Obermaier Johannes","year":"2018","unstructured":"Johannes Obermaier and Vincent Immler. 2018. The past, present, and future of physical security enclosures: from battery-backed monitoring to puf-based inherent security and beyond. Journal of hardware and systems security (2018)."},{"key":"e_1_3_2_1_43_1","unstructured":"Olivier Girard. 2009. OpenMSP430. https:\/\/opencores.org\/projects\/openmsp430\/."},{"key":"e_1_3_2_1_44_1","unstructured":"OpenSim Ltd. [n.d.]. OMNeT++ Discrete Event Simulator. https:\/\/omnetpp.org\/."},{"key":"e_1_3_2_1_45_1","unstructured":"P. Frolikov Y. Kim R. Prapty G. Tsudik. [n.d.]. TRAIN source code. https:\/\/github.com\/sprout-uci\/TRAIN."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0229-6"},{"key":"e_1_3_2_1_47_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Petzi Lukas","year":"2022","unstructured":"Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, and Samuel Kounev. 2022. {SCRAPS}: Scalable Collective Remote Attestation for {Pub-Sub}{IoT} Networks with Untrusted Proxy Verifier. In 31st USENIX Security Symposium (USENIX Security 22)."},{"key":"e_1_3_2_1_48_1","unstructured":"Srivaths Ravi Anand Raghunathan and Srimat Chakradhar. 2004. Tamper resistance mechanisms for secure embedded systems. In VLSI Design."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358261"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_20"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484788"},{"key":"e_1_3_2_1_54_1","unstructured":"Microchip Technology. [n.d.]. MCP7940M: Low-Cost I2C Real-Time Clock\/Calendar with SRAM. https:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/MCP7940M-Low-Cost%%20I2C-RTCC-with-SRAM-20002292C.pdf"},{"key":"e_1_3_2_1_55_1","unstructured":"Texas Instruments. 2016. MSP430 GCC User's Guide. https:\/\/www.ti.com\/tool\/MSP430-GCC-OPENSOURCE\/."},{"key":"e_1_3_2_1_56_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Jinwen","year":"2023","unstructured":"Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y Thomas Hou, and Ning Zhang. 2023. {ARI}: Attestation of Real-time Mission Execution Integrity. In 32nd USENIX Security Symposium (USENIX Security 23)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976609"}],"event":{"name":"SenSys '25: 23rd ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGOPS ACM Special Interest Group on Operating Systems","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"UC Irvine Student Center. Irvine CA USA","acronym":"SenSys '25"},"container-title":["Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3722057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3715014.3722057","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:57Z","timestamp":1750295877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3722057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":57,"alternative-id":["10.1145\/3715014.3722057","10.1145\/3715014"],"URL":"https:\/\/doi.org\/10.1145\/3715014.3722057","relation":{},"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2025-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}