{"id":"https://openalex.org/W2752493903","doi":"https://doi.org/10.1145/2976749.2978358","title":"C-FLAT","display_name":"C-FLAT","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2752493903","doi":"https://doi.org/10.1145/2976749.2978358","mag":"2752493903"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032292280","display_name":"Tigist Abera","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tigist Abera","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016685507","display_name":"N. Asokan","orcid":"https://orcid.org/0000-0002-5093-9871"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"N. Asokan","raw_affiliation_strings":["Aalto University, Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089242868","display_name":"Lucas Davi","orcid":"https://orcid.org/0000-0002-7322-2777"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lucas Davi","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048305988","display_name":"Jan-Erik Ekberg","orcid":"https://orcid.org/0009-0007-5432-6128"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jan-Erik Ekberg","raw_affiliation_strings":["Trustonic, Helsinki, Finland"],"affiliations":[{"raw_affiliation_string":"Trustonic, Helsinki, Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032600730","display_name":"Thomas Nyman","orcid":"https://orcid.org/0000-0001-7647-6230"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Thomas Nyman","raw_affiliation_strings":["Aalto University &amp; Trustonic, Helsinki, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University &amp; Trustonic, Helsinki, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010807871","display_name":"Andrew Paverd","orcid":"https://orcid.org/0000-0003-2188-5285"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Andrew Paverd","raw_affiliation_strings":["Aalto University, Aalto, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Aalto, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California, Irvine, Irvine, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5032292280"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":32.3688,"has_fulltext":false,"cited_by_count":244,"citation_normalized_percentile":{"value":0.99658481,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"743","last_page":"754"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8167253732681274},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.7929821014404297},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6535530686378479},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5466485619544983},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5459555387496948},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5412291288375854},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5367276668548584},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4914332628250122},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.4611319601535797},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.45315197110176086},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42654645442962646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4167748689651489},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41490650177001953},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.413849800825119},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3729288578033447},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.341777503490448},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.23435497283935547},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21683669090270996},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15476220846176147},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.12840548157691956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8167253732681274},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.7929821014404297},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6535530686378479},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5466485619544983},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5459555387496948},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5412291288375854},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5367276668548584},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4914332628250122},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.4611319601535797},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.45315197110176086},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42654645442962646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4167748689651489},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41490650177001953},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.413849800825119},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3729288578033447},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.341777503490448},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.23435497283935547},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21683669090270996},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15476220846176147},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.12840548157691956},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2374655500","display_name":null,"funder_award_id":"H98230-15-1-0276","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"},{"id":"https://openalex.org/G4351222689","display_name":null,"funder_award_id":"CRC1119","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5565381524","display_name":null,"funder_award_id":"14089-503866-DS","funder_id":"https://openalex.org/F4320306110","funder_display_name":"U.S. Department of Homeland Security"},{"id":"https://openalex.org/G6614539040","display_name":null,"funder_award_id":"283135","funder_id":"https://openalex.org/F4320321108","funder_display_name":"Academy of Finland"},{"id":"https://openalex.org/G7263572847","display_name":null,"funder_award_id":"643964","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"},{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"},{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1112477","https://openalex.org/W36092891","https://openalex.org/W198928148","https://openalex.org/W1538332098","https://openalex.org/W1631846088","https://openalex.org/W1816718056","https://openalex.org/W1823377586","https://openalex.org/W1963947298","https://openalex.org/W1969501726","https://openalex.org/W1972111566","https://openalex.org/W1983712198","https://openalex.org/W1984187936","https://openalex.org/W1996931407","https://openalex.org/W2011392821","https://openalex.org/W2021362805","https://openalex.org/W2050529434","https://openalex.org/W2075095478","https://openalex.org/W2081105932","https://openalex.org/W2086277109","https://openalex.org/W2089448621","https://openalex.org/W2098621209","https://openalex.org/W2099382052","https://openalex.org/W2099613071","https://openalex.org/W2104948281","https://openalex.org/W2117798902","https://openalex.org/W2119812052","https://openalex.org/W2128159601","https://openalex.org/W2135274013","https://openalex.org/W2141389113","https://openalex.org/W2149209089","https://openalex.org/W2152605584","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2167804035","https://openalex.org/W2397986719","https://openalex.org/W2576376563","https://openalex.org/W2699635299","https://openalex.org/W2752493903","https://openalex.org/W2978757628","https://openalex.org/W4285719527","https://openalex.org/W6600040955","https://openalex.org/W6638559843","https://openalex.org/W6678545021","https://openalex.org/W6768779726"],"related_works":["https://openalex.org/W2095925360","https://openalex.org/W1549956274","https://openalex.org/W4246377515","https://openalex.org/W2052160877","https://openalex.org/W2040778456","https://openalex.org/W2148473336","https://openalex.org/W2119238100","https://openalex.org/W4254236578","https://openalex.org/W2144344516","https://openalex.org/W1754116331"],"abstract_inverted_index":{"Remote":[0],"attestation":[1,99],"is":[2,48],"a":[3,19,28,77,112,133],"crucial":[4],"security":[5,126],"service":[6],"particularly":[7],"relevant":[8],"to":[9,23,58],"increasingly":[10],"popular":[11],"IoT":[12],"(and":[13],"other":[14],"embedded)":[15],"devices.":[16],"It":[17],"allows":[18],"trusted":[20],"party":[21],"(verifier)":[22],"learn":[24],"the":[25,52,63,88,107],"state":[26],"of":[27,92,100,116],"remote,":[29],"and":[30,42,90,138],"potentially":[31],"malware-infected,":[32],"device":[33],"(prover).":[34],"Most":[35],"existing":[36],"approaches":[37],"are":[38,56],"static":[39],"in":[40],"nature":[41],"only":[43],"check":[44],"whether":[45],"benign":[46],"software":[47],"initially":[49],"loaded":[50],"on":[51,118],"prover.":[53],"However,":[54],"they":[55],"vulnerable":[57],"runtime":[59,83],"attacks":[60],"that":[61,96],"hijack":[62],"application's":[64,102],"control":[65],"or":[66,73],"data":[67],"flow,":[68],"e.g.,":[69],"via":[70],"return-oriented":[71],"programming":[72],"data-oriented":[74],"exploits.":[75],"As":[76],"concrete":[78],"step":[79],"towards":[80],"more":[81],"comprehensive":[82],"remote":[84,98],"attestation,":[85],"we":[86],"present":[87],"design":[89],"implementation":[91,115],"Control-FLow":[93],"ATtestation":[94],"(C-FLAT)":[95],"enables":[97],"an":[101],"control-flow":[103,143],"path,":[104],"without":[105],"requiring":[106],"source":[108],"code.":[109],"We":[110,128],"describe":[111],"full":[113],"prototype":[114],"C-FLAT":[117],"Raspberry":[119],"Pi":[120],"using":[121,132],"its":[122,140],"ARM":[123],"TrustZone":[124],"hardware":[125],"extensions.":[127],"evaluate":[129],"C-FLAT's":[130],"performance":[131],"real-world":[134],"embedded":[135],"(cyber-physical)":[136],"application,":[137],"demonstrate":[139],"efficacy":[141],"against":[142],"hijacking":[144],"attacks.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":26},{"year":2021,"cited_by_count":32},{"year":2020,"cited_by_count":33},{"year":2019,"cited_by_count":33},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2017-09-15T00:00:00"}
