{"id":"https://openalex.org/W2806634969","doi":"https://doi.org/10.1145/3196494.3196526","title":"Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security","display_name":"Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2806634969","doi":"https://doi.org/10.1145/3196494.3196526","mag":"2806634969"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196526","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196526","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196526","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196526","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033300489","display_name":"Xavier Carpent","orcid":"https://orcid.org/0000-0003-1697-6940"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xavier Carpent","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061680900","display_name":"Karim Eldefrawy","orcid":"https://orcid.org/0000-0002-4008-0047"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]},{"id":"https://openalex.org/I4210099336","display_name":"Menlo School","ror":"https://ror.org/01240pn49","country_code":"US","type":"education","lineage":["https://openalex.org/I4210099336"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karim Eldefrawy","raw_affiliation_strings":["SRI International, Menlo Park, CA, USA"],"affiliations":[{"raw_affiliation_string":"SRI International, Menlo Park, CA, USA","institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003935638","display_name":"Norrathep Rattanavipanon","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Norrathep Rattanavipanon","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033300489"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":1.9516,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.89414071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"313","last_page":"327"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8364158868789673},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7707847356796265},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.7447366714477539},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6597529053688049},{"id":"https://openalex.org/keywords/atomicity","display_name":"Atomicity","score":0.6314116716384888},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5366811752319336},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5252957940101624},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4657042622566223},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44779348373413086},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4399964213371277},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42538517713546753},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41213154792785645},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3272516131401062},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28421637415885925},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22182443737983704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8364158868789673},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7707847356796265},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.7447366714477539},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6597529053688049},{"id":"https://openalex.org/C188045909","wikidata":"https://www.wikidata.org/wiki/Q3306359","display_name":"Atomicity","level":3,"score":0.6314116716384888},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5366811752319336},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5252957940101624},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4657042622566223},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44779348373413086},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4399964213371277},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42538517713546753},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41213154792785645},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3272516131401062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28421637415885925},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22182443737983704},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196526","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196526","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196526","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196526","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196526","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196526","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[{"id":"https://openalex.org/G3237082426","display_name":null,"funder_award_id":"W911NF-16-1-0536","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8783965605","display_name":null,"funder_award_id":"1702911","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2806634969.pdf","grobid_xml":"https://content.openalex.org/works/W2806634969.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1544304752","https://openalex.org/W1594255645","https://openalex.org/W2010910232","https://openalex.org/W2021362805","https://openalex.org/W2075095478","https://openalex.org/W2089448621","https://openalex.org/W2099613071","https://openalex.org/W2104948281","https://openalex.org/W2108403445","https://openalex.org/W2135274013","https://openalex.org/W2136310957","https://openalex.org/W2143842190","https://openalex.org/W2152605584","https://openalex.org/W2169633417","https://openalex.org/W2213391909","https://openalex.org/W2388447476","https://openalex.org/W2397423248","https://openalex.org/W2401503174","https://openalex.org/W2539207008","https://openalex.org/W2598594926","https://openalex.org/W2604623598","https://openalex.org/W2808465942","https://openalex.org/W2912148360","https://openalex.org/W2963265635","https://openalex.org/W3033383276","https://openalex.org/W4250874986"],"related_works":["https://openalex.org/W1511774205","https://openalex.org/W3210438939","https://openalex.org/W2771872416","https://openalex.org/W2157901542","https://openalex.org/W2280933377","https://openalex.org/W2783731972","https://openalex.org/W4312776354","https://openalex.org/W4248541521","https://openalex.org/W1582906022","https://openalex.org/W1550771246"],"abstract_inverted_index":{"Assuring":[0],"integrity":[1,131],"of":[2,33,63,75,83,101,108,125,154],"information":[3],"(e.g.,":[4],"data":[5,35,81],"and/or":[6,38],"software)":[7],"is":[8,36,42,54,134],"usually":[9],"accomplished":[10],"by":[11],"cryptographic":[12],"means,":[13],"such":[14,24,76],"as":[15],"hash":[16],"functions":[17,26,77],"or":[18,50,57,112,118,136],"message":[19],"authentication":[20],"codes":[21],"(MACs).":[22],"Computing":[23],"integrity-ensuring":[25,67,103],"can":[27,150],"be":[28,94,151],"time-consuming":[29,66],"if":[30,96],"the":[31,39,45],"amount":[32],"input":[34,80,109],"large":[37],"computing":[40,64],"platform":[41],"weak.":[43],"At":[44],"same":[46],"time,":[47],"in":[48,146],"real-time":[49],"safety-critical":[51],"settings,":[52],"it":[53],"often":[55],"impractical":[56],"even":[58],"undesirable":[59],"to":[60,159],"guarantee":[61],"atomicity":[62],"a":[65,152],"function.":[68],"Meanwhile,":[69],"standard":[70],"correctness":[71],"and":[72,105,141,148],"security":[73],"definitions":[74,147],"assume":[78],"that":[79,110,133],"(regardless":[82],"its":[84],"size)":[85],"remains":[86],"consistent":[87],"throughout":[88],"computation.":[89],"However,":[90],"temporal":[91,126],"consistency":[92,127],"may":[93],"lost":[95],"another":[97],"process":[98],"interrupts":[99],"execution":[100],"an":[102,130],"function":[104],"modifies":[106],"portions":[107],"either":[111],"both:":[113],"(1)":[114],"were":[115,120],"already":[116],"processed,":[117],"(2)":[119],"not":[121],"processed":[122],"yet.":[123],"Lack":[124],"might":[128,157],"yield":[129],"result":[132],"non-sensical":[135],"simply":[137],"incorrect.":[138],"Such":[139],"subtleties":[140],"discrepancies":[142],"between":[143],"(implicit)":[144],"assumptions":[145],"implementations":[149],"source":[153],"inconsistenceies,":[155],"which":[156],"lead":[158],"vulnerabilities.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
