{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:36:37Z","timestamp":1759332997835,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342055","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"473-478","source":"Crossref","is-referenced-by-count":9,"title":["Device attestation: Past, present, and future"],"prefix":"10.23919","author":[{"given":"Orlando","family":"Arias","sequence":"first","affiliation":[]},{"given":"Fahim","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","article-title":"Spec cpu2006 benchmark descriptions","volume":"34","author":"henning","year":"2006","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0107216"},{"journal-title":"Security technology building a secure system using trustzone technology (white paper)","year":"2009","key":"ref33"},{"key":"ref32","first-page":"2008","article-title":"Cyber incident blamed for nuclear power plant shutdown","volume":"5","author":"krebs","year":"2008","journal-title":"Washington Post"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.152"},{"journal-title":"PULP Platform","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8"},{"journal-title":"OpenMSP430 Project","year":"0","key":"ref35"},{"key":"ref34","first-page":"12","article-title":"Message authentication using hash functions: The hmac construction","volume":"2","author":"bellare","year":"1996","journal-title":"RSA Laboratories Cryptobytes"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2014.6970342"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"ref14","first-page":"1","article-title":"Smart: Secure and minimal architecture for (establishing dynamic) root of trust","volume":"12","author":"eldefrawy","year":"2012","journal-title":"NDSS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"journal-title":"White Paper An Overview of Samsung Knox","year":"2013","author":"knox","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"ref27","article-title":"When firmware modifications attack: A case study of embedded exploitation","author":"cui","year":"2013","journal-title":"NDSS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/497181a"},{"journal-title":"Malicious control system cyber security attack case study&#x2014;maroochy water services australia","year":"2008","author":"abrams","key":"ref8"},{"key":"ref7","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref2","article-title":"Popular internet of things forecast of 50 billion devices by 2020 is outdated","author":"nordrum","year":"2016","journal-title":"IEEE Spectrum"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"journal-title":"The internet of things - how the next evolution of the internet is chaging everything","year":"2011","author":"evans","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372563"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"ref25","article-title":"Smashing the stack for fun and profit (1996)","author":"one","year":"2007","journal-title":"Phrack Magazine"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342055.pdf?arnumber=8342055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T11:13:58Z","timestamp":1525432438000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342055","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}