{"id":"https://openalex.org/W2809340493","doi":"https://doi.org/10.1145/3195970.3199853","title":"Reconciling remote attestation and safety-critical operation on simple IoT devices","display_name":"Reconciling remote attestation and safety-critical operation on simple IoT devices","publication_year":2018,"publication_date":"2018-06-19","ids":{"openalex":"https://openalex.org/W2809340493","doi":"https://doi.org/10.1145/3195970.3199853","mag":"2809340493"},"language":"en","primary_location":{"id":"doi:10.1145/3195970.3199853","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3195970.3199853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th Annual Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033300489","display_name":"Xavier Carpent","orcid":"https://orcid.org/0000-0003-1697-6940"},"institutions":[{"id":"https://openalex.org/I4210137750","display_name":"UC Irvine Health","ror":"https://ror.org/03fgher32","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210137750"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xavier Carpent","raw_affiliation_strings":["UC Irvine"],"affiliations":[{"raw_affiliation_string":"UC Irvine","institution_ids":["https://openalex.org/I4210137750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061680900","display_name":"Karim Eldefrawy","orcid":"https://orcid.org/0000-0002-4008-0047"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karim Eldefrawy","raw_affiliation_strings":["SRI International"],"affiliations":[{"raw_affiliation_string":"SRI International","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003935638","display_name":"Norrathep Rattanavipanon","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137750","display_name":"UC Irvine Health","ror":"https://ror.org/03fgher32","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210137750"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Norrathep Rattanavipanon","raw_affiliation_strings":["UC Irvine"],"affiliations":[{"raw_affiliation_string":"UC Irvine","institution_ids":["https://openalex.org/I4210137750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["TU Darmstadt"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I4210137750","display_name":"UC Irvine Health","ror":"https://ror.org/03fgher32","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210137750"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["UC Irvine"],"affiliations":[{"raw_affiliation_string":"UC Irvine","institution_ids":["https://openalex.org/I4210137750"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033300489"],"corresponding_institution_ids":["https://openalex.org/I4210137750"],"apc_list":null,"apc_paid":null,"fwci":1.8615,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89037323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7963806390762329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7759666442871094},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5472511649131775},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.5431555509567261},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.518821656703949},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5016045570373535},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19507408142089844}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7963806390762329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7759666442871094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5472511649131775},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.5431555509567261},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.518821656703949},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5016045570373535},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19507408142089844},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3195970.3199853","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3195970.3199853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th Annual Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1544304752","https://openalex.org/W1656678770","https://openalex.org/W1968465951","https://openalex.org/W2013613544","https://openalex.org/W2075095478","https://openalex.org/W2089448621","https://openalex.org/W2108403445","https://openalex.org/W2135274013","https://openalex.org/W2136310957","https://openalex.org/W2149469814","https://openalex.org/W2152605584","https://openalex.org/W2169633417","https://openalex.org/W2472201937","https://openalex.org/W2534678535","https://openalex.org/W2602856088","https://openalex.org/W2604623598","https://openalex.org/W2734401556","https://openalex.org/W2741580233","https://openalex.org/W2748868501","https://openalex.org/W2750909795","https://openalex.org/W2806634969","https://openalex.org/W2808465942","https://openalex.org/W4250874986","https://openalex.org/W4285719527","https://openalex.org/W4299301436","https://openalex.org/W6636970380","https://openalex.org/W6760004968"],"related_works":["https://openalex.org/W2899793048","https://openalex.org/W2950202488","https://openalex.org/W1594411369","https://openalex.org/W4385887367","https://openalex.org/W2027534055","https://openalex.org/W2604424424","https://openalex.org/W4242357733","https://openalex.org/W1590594965","https://openalex.org/W2129095855","https://openalex.org/W150734495"],"abstract_inverted_index":{"Remote":[0],"attestation":[1,143],"(RA)":[2],"is":[3,26,99],"a":[4,15,19],"means":[5],"of":[6,36,115,120,126],"malware":[7,40,58],"detection,":[8],"typically":[9],"realized":[10],"as":[11,139,141],"an":[12],"interaction":[13],"between":[14,63],"trusted":[16],"verifier":[17],"and":[18,48,61,88,101,128,150],"potentially":[20,71],"compromised":[21],"remote":[22,122],"device":[23],"(prover).":[24],"RA":[25,44,65,97],"especially":[27],"relevant":[28],"for":[29],"low-end":[30],"embedded":[31],"devices":[32],"that":[33,59,110,145],"are":[34],"incapable":[35],"protecting":[37],"themselves":[38],"against":[39],"infection.":[41],"Most":[42],"current":[43],"techniques":[45],"require":[46],"on-demand":[47,94],"uninterruptible":[49],"(atomic)":[50],"operation.":[51],"The":[52],"former":[53],"fails":[54],"to":[55,83,103],"detect":[56],"transient":[57,127],"enters":[60],"leaves":[62],"successive":[64],"instances;":[66],"the":[67,84],"latter":[68],"involves":[69,146],"performing":[70],"time-consuming":[72],"computation":[73],"over":[74],"prover's":[75],"memory":[76,148,152],"and/or":[77],"storage,":[78],"which":[79],"can":[80],"be":[81],"harmful":[82],"device's":[85],"safety-critical":[86,116],"functionality":[87],"general":[89],"availability.":[90],"However,":[91],"relaxing":[92],"either":[93],"or":[95],"atomic":[96],"operation":[98,117],"tricky":[100],"prone":[102],"vulnerabilities.":[104],"This":[105],"paper":[106],"identifies":[107],"some":[108],"issues":[109],"arise":[111],"in":[112],"reconciling":[113],"requirements":[114],"with":[118],"those":[119],"secure":[121],"attestation,":[123],"including":[124,136],"detection":[125],"self-relocating":[129],"malware.":[130],"It":[131],"also":[132],"investigates":[133],"mitigation":[134],"techniques,":[135],"periodic":[137],"self-measurements":[138],"well":[140],"interruptible":[142],"modality":[144],"shuffled":[147],"traversals":[149],"various":[151],"locking":[153],"mechanisms.":[154]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
