{"id":"https://openalex.org/W2160773001","doi":"https://doi.org/10.1109/secpri.2003.1199335","title":"Specifying and verifying hardware for tamper-resistant software","display_name":"Specifying and verifying hardware for tamper-resistant software","publication_year":2004,"publication_date":"2004-05-13","ids":{"openalex":"https://openalex.org/W2160773001","doi":"https://doi.org/10.1109/secpri.2003.1199335","mag":"2160773001"},"language":"en","primary_location":{"id":"doi:10.1109/secpri.2003.1199335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2003.1199335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049933072","display_name":"David Lie","orcid":"https://orcid.org/0000-0002-2000-6827"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D. Lie","raw_affiliation_strings":["Computer Systems Laboratory, University of Stanford, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Systems Laboratory, University of Stanford, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101897622","display_name":"John C. Mitchell","orcid":"https://orcid.org/0000-0002-0024-860X"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Mitchell","raw_affiliation_strings":["Computer Systems Laboratory, University of Stanford, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Systems Laboratory, University of Stanford, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086887602","display_name":"Chandramohan A. Thekkath","orcid":"https://orcid.org/0009-0004-9924-2428"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]},{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"C.A. Thekkath","raw_affiliation_strings":["Computer Systems Laboratory, University of Stanford, Stanford, CA, USA","Microsoft Research Limited, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Systems Laboratory, University of Stanford, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]},{"raw_affiliation_string":"Microsoft Research Limited, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090469068","display_name":"Mark Horowitz","orcid":"https://orcid.org/0000-0003-3245-7542"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Horowitz","raw_affiliation_strings":["Computer Systems Laboratory, University of Stanford, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Systems Laboratory, University of Stanford, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049933072"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":11.5532,"has_fulltext":false,"cited_by_count":96,"citation_normalized_percentile":{"value":0.98434581,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.8541940450668335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.841832160949707},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.6055706143379211},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.586134672164917},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5846239328384399},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5813499689102173},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5448359251022339},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.45405393838882446},{"id":"https://openalex.org/keywords/tamper-resistance","display_name":"Tamper resistance","score":0.41968396306037903},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40806734561920166},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3096628785133362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1913468837738037}],"concepts":[{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.8541940450668335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.841832160949707},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.6055706143379211},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.586134672164917},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5846239328384399},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5813499689102173},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5448359251022339},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.45405393838882446},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.41968396306037903},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40806734561920166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3096628785133362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1913468837738037},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/secpri.2003.1199335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2003.1199335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.140.7794","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7794","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/LIE_IEEESP04.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.2.2598","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.2598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://theory.stanford.edu/people/jcm/papers/lie-oakland2003.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W18781825","https://openalex.org/W98763178","https://openalex.org/W99109393","https://openalex.org/W122260674","https://openalex.org/W1528878926","https://openalex.org/W1534087991","https://openalex.org/W1539432158","https://openalex.org/W1555250994","https://openalex.org/W1562901937","https://openalex.org/W1593676544","https://openalex.org/W1593760450","https://openalex.org/W1966212263","https://openalex.org/W1979331092","https://openalex.org/W1994676271","https://openalex.org/W2010608535","https://openalex.org/W2029693536","https://openalex.org/W2065207200","https://openalex.org/W2108255910","https://openalex.org/W2110423379","https://openalex.org/W2115309705","https://openalex.org/W2116685080","https://openalex.org/W2116989825","https://openalex.org/W2124679171","https://openalex.org/W2132107743","https://openalex.org/W2150682469","https://openalex.org/W2167569963","https://openalex.org/W3143649921","https://openalex.org/W4213148345","https://openalex.org/W4233287603","https://openalex.org/W4285719527","https://openalex.org/W4299115897","https://openalex.org/W6600780964","https://openalex.org/W6605045475","https://openalex.org/W6631782875","https://openalex.org/W6632149249","https://openalex.org/W6633219916","https://openalex.org/W6641534382","https://openalex.org/W6838336854"],"related_works":["https://openalex.org/W1565271071","https://openalex.org/W2081199208","https://openalex.org/W3160870209","https://openalex.org/W3349016","https://openalex.org/W2494011163","https://openalex.org/W2147348835","https://openalex.org/W2082472813","https://openalex.org/W3005566532","https://openalex.org/W2164319435","https://openalex.org/W1997072713"],"abstract_inverted_index":{"We":[0],"specify":[1],"a":[2,21,31,49,76,92,130],"hardware":[3],"architecture":[4,44,121],"that":[5,35,116],"supports":[6],"tamper-resistant":[7],"software":[8,68],"by":[9,47],"identifying":[10],"an":[11,39],"\"idealized\"":[12],"model,":[13],"which":[14],"gives":[15],"the":[16,60,72,84,88,101,107,120,135],"abstracted":[17],"actions":[18,37,118],"available":[19],"to":[20,30,56,99,106,114,138],"single":[22],"user":[23],"program.":[24],"This":[25],"idealized":[26,61],"model":[27,34,54,80],"is":[28,45,81],"compared":[29],"concrete":[32],"\"actual\"":[33],"includes":[36],"of":[38,59,103,132],"adversarial":[40],"operating":[41,136],"system.":[42],"The":[43],"verified":[46],"using":[48],"finite-state":[50],"enumeration":[51],"tool":[52],"(a":[53],"checker)":[55],"compare":[57],"executions":[58],"and":[62,96],"actual":[63],"models.":[64],"In":[65],"this":[66],"approach,":[67],"tampering":[69],"occurs":[70],"if":[71],"system":[73,137],"can":[74],"enter":[75],"state":[77],"where":[78],"one":[79],"inconsistent":[82],"with":[83,129],"other":[85],"in":[86,119],"performing":[87],"verification,":[89],"we":[90],"detected":[91],"replay":[93],"attack":[94],"scenario":[95],"were":[97,111],"able":[98,113],"verify":[100,115],"security":[102],"our":[104],"solution":[105],"problem.":[108],"Our":[109],"methods":[110],"also":[112],"all":[117],"are":[122],"required,":[123],"as":[124,126],"well":[125],"come":[127],"up":[128],"set":[131],"constraints":[133],"on":[134],"guarantee":[139],"liveness":[140],"for":[141],"users.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
