{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:28:55Z","timestamp":1726000135485},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030030254"},{"type":"electronic","value":"9783030030261"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03026-1_9","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T15:45:45Z","timestamp":1542642345000},"page":"126-140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["H-Verifier: Verifying Confidential System State with Delegated Sandboxes"],"prefix":"10.1007","author":[{"given":"Anyi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guangzhi","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"9_CR1","unstructured":"Darwish, M., Ouda, A., Capretz, L.: Cloud-based DDoS attacks and defenses. In: Proceedings of 2013 International Conference on Information Society, pp. 67\u201371 (2013)"},{"key":"9_CR2","unstructured":"Ciancaglini, V., Balduzzi, M., McArdle, R., R\u00f6sler, M.: Below the surface: exploring the deep web (2015). https:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp_below_the_surface.pdf"},{"key":"9_CR3","unstructured":"Symantec: Avoiding the hidden costs of the cloud. https:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/b-state-of-cloud-global-results-2013.en-us.pdf"},{"key":"9_CR4","unstructured":"Samani, R., Paget, F.: Cybercrime exposed: cybercrime-as-a-servic (2013). http:\/\/www.mcafee.com\/jp\/resources\/white-papers\/wp-cybercrime-exposed.pdf"},{"key":"9_CR5","unstructured":"Goodin, D.: Zeusbot found using Amazon\u2019s EC2 as C&C server. http:\/\/www.theregister.co.uk\/2009\/12\/09\/amazon_ec2_bot_control_channel\/"},{"issue":"9","key":"9_CR6","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1016\/j.jss.2012.12.025","volume":"86","author":"MD Ryan","year":"2013","unstructured":"Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263\u20132268 (2013)","journal-title":"J. Syst. Softw."},{"key":"9_CR7","unstructured":"Alliance, C.S.: CSA security, trust & assurance registry (STAR). https:\/\/cloudsecurityalliance.org\/star\/#_overview"},{"key":"9_CR8","unstructured":"Santos, N., Rodrigues, R., Gummadi, K.P., Saroiu, S.: Policy-sealed data: a new abstraction for building trusted cloud services. In: Proceedings of 21st USENIX Security Symposium, pp. 175\u2013188 (2012)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Sirer, E.G., et al.: Logical attestation: an authorization architecture for trustworthy computing. In: Proceedings of 23rd ACM Symposium on Operating Systems Principles, pp. 249\u2013264 (2011)","DOI":"10.1145\/2043556.2043580"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Butt, S., Lagar-Cavilla, H.A., Srivastava, A., Ganapathy, V.: Self-service cloud computing. In: Proceedings of 2012 ACM Conference on Computer and Communications Security, pp. 253\u2013264 (2012)","DOI":"10.1145\/2382196.2382226"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, F., Chen, J., Chen, H., Zang, B.: Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of 23rd ACM Symposium on Operating Systems Principles, pp. 203\u2013216 (2011)","DOI":"10.1145\/2043556.2043576"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Ko, R.K., et al.: TrustCloud: a framework for accountability and trust in cloud computing. In: Proceedings of 2011 IEEE World Congress on Services, pp. 584\u2013588 (2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"9_CR13","unstructured":"Intel: Intel. 64 and IA-32 architectures software developer\u2019s manual. Technical report. http:\/\/www.intel.com\/content\/www\/us\/en\/processors\/architectures-software-dev eloper-manuals.html"},{"key":"9_CR14","unstructured":"Intel Corporation: Intel trusted execution technology: software development guide. Technical report. http:\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"McKeen, F., et al.: Intel software guard extensions support for dynamic memory management inside an enclave. In: Proceedings of Hardware and Architectural Support for Security and Privacy, pp. 101\u2013109 (2016)","DOI":"10.1145\/2948618.2954331"},{"issue":"3","key":"9_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1368506.1368517","volume":"42","author":"B Hay","year":"2008","unstructured":"Hay, B., Nance, K.: Forensics examination of volatile system data using virtual introspection. ACM SIGOPS Oper. Syst. Rev. 42(3), 74\u201382 (2008)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Fu, Y., Lin, Z.: Space traveling across VM: automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In: 2012 IEEE Symposium on Security and Privacy, pp. 586\u2013600, May 2012","DOI":"10.1109\/SP.2012.40"},{"key":"9_CR18","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceedings of Network and Distributed Systems Security Symposium, pp. 191\u2013206 (2003)"},{"issue":"2","key":"9_CR19","doi-asserted-by":"publisher","first-page":"7:1","DOI":"10.1145\/2505124","volume":"16","author":"Y Fu","year":"2013","unstructured":"Fu, Y., Lin, Z.: Bridging the semantic gap in virtual machine introspection via online kernel data redirection. ACM Trans. Inf. Syst. Secur. 16(2), 7:1\u20137:29 (2013). https:\/\/doi.org\/10.1145\/2505124","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. ACM, New York (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539\u2013556. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_38"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 327\u2013332 (2010)","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"issue":"5","key":"9_CR23","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/TDSC.2014.2369034","volume":"12","author":"Y Hong","year":"2015","unstructured":"Hong, Y., Vaidya, J., Lu, H., Karras, P., Goel, S.: Collaborative search log sanitization: toward differential privacy and boosted utility. IEEE Trans. Dependable Secur. Comput. 12(5), 504\u2013518 (2015). https:\/\/doi.org\/10.1109\/TDSC.2014.2369034","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Washington, DC, USA, pp. 97\u2013106. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/FOCS.2011.12","DOI":"10.1109\/FOCS.2011.12"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of 2012 ACM conference on Computer and communications security, pp. 305\u2013316. ACM, New York (2012)","DOI":"10.1145\/2382196.2382230"},{"key":"9_CR26","unstructured":"Yarom, Y., Falkner, K.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, pp. 719\u2013732. USENIX Association (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"9_CR27","unstructured":"Lee, S., Shih, M.-W., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In: 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, pp. 557\u2013574. USENIX Association (2017). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/p resentation\/lee-sangho"},{"key":"9_CR28","unstructured":"Brasser, F., M\u00fcller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.-R.: Software grand exposure: SGX cache attacks are practical. In: 11th USENIX Workshop on Offensive Technologies (WOOT 17), Vancouver, BC. USENIX Association (2017). https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/ brasser"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Guanciale, R., Nemati, H., Baumann, C., Dam, M.: Cache storage channels: Alias-driven attacks and verified countermeasures. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 38\u201355, May 2016. https:\/\/doi.org\/10.1109\/SP.2016.11","DOI":"10.1109\/SP.2016.11"},{"key":"9_CR30","unstructured":"Dean, D., Hu, A.J.: Fixing races for fun and profit: how to use access(2). In: Proceedings of 13th USENIX Security Symposium, p. 14 (2004)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Weiser, S., Gruss, D., Maurice, C., Mangard, S.: Malware guard extension: using SGX to conceal cache attacks. CoRR, vol. abs\/1702.08719 (2017)","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Dua, G., Gautam, N., Sharma, D., Arora, A.: Replay attack prevention in Kerberos authentication protocol using triple password. CoRR, vol. abs\/1304.3550 (2013)","DOI":"10.5121\/ijcnc.2013.5205"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"issue":"8","key":"9_CR34","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996)","journal-title":"Proc. IEEE"},{"key":"9_CR35","doi-asserted-by":"publisher","unstructured":"Bhatkar, S., Chaturvedi, A., Sekar, R.: Dataflow anomaly detection. In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21\u201324 May 2006, Berkeley, California, USA, pp. 48\u201362 (2006). https:\/\/doi.org\/10.1109\/SP.2006.12","DOI":"10.1109\/SP.2006.12"},{"key":"9_CR36","unstructured":"HElib: the library that implements homomorphic encryption (HE). https:\/\/github.com\/shaih\/HElib"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. dissertation, Stanford, CA, USA, AAI3382729 (2009)","DOI":"10.1145\/1536414.1536440"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03026-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T17:48:22Z","timestamp":1572976102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03026-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030030254","9783030030261"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03026-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sci-cs.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2-3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}