{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:57:41Z","timestamp":1764784661520,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030763831"},{"type":"electronic","value":"9783030763848"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76384-8_17","type":"book-chapter","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:50:53Z","timestamp":1621381853000},"page":"268-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Infrastructure for Faithful Execution of Remote Attestation Protocols"],"prefix":"10.1007","author":[{"given":"Adam","family":"Petz","sequence":"first","affiliation":[]},{"given":"Perry","family":"Alexander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Aydemir, B., Chargu\u00e9raud, A., Pierce, B.C., Pollack, R., Weirich, S.: Engineering formal metatheory. In: Proceedings of the 35th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, pp. 3\u201315. ACM, New York (2008). https:\/\/doi.org\/10.1145\/1328438.1328443","DOI":"10.1145\/1328438.1328443"},{"key":"17_CR2","unstructured":"Berger, S., Caceres, R., Goldman, K., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. iBM T. J. Watson Research Center, Hawthorne (2006). http:\/\/www.kiskeya.net\/ramon\/work\/pubs\/security06.pdf"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Brasser, F., El Mahjoub, B., Sadeghi, A.R., Wachsmann, C., Koeberl, P.: Tytan: tiny trust anchor for tiny devices. In: Proceedings of the 52nd Annual Design Automation Conference. DAC 2015. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2744769.2744922","DOI":"10.1145\/2744769.2744922"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Carpent, X., Rattanavipanon, N., Tsudik, G.: ERASMUS: efficient remote attestation via self- measurement for unattended settings. CoRR abs\/1707.09043 (2017). http:\/\/arxiv.org\/abs\/1707.09043","DOI":"10.23919\/DATE.2018.8342195"},{"key":"17_CR5","volume-title":"A Practical Guide to Trusted Computing","author":"D Challener","year":"2008","unstructured":"Challener, D., Yoder, K., Catherman, R.: A Practical Guide to Trusted Computing. IBM Press, Indianapolis (2008)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Clemens, J., Pal, R., Sherrell, B.: Runtime state verification on resource-constrained platforms. In: MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), pp. 1\u20136 (2018)","DOI":"10.1109\/MILCOM.2018.8599862"},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., et al.: Principles of remote attestation. Int. J. Inf. Secur. 10(2), 63\u201381 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Coker, G.S., Guttman, J.D., Loscocco, P.A., Sheehy, J., Sniffen, B.T.: Attestation: evidence and trust. In: Proceedings of the International Conference on Information and Communications Security, vol. LNCS 5308 (2008)","DOI":"10.1007\/978-3-540-88625-9_1"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 221\u2013236. IEEE (2009)","DOI":"10.1109\/SP.2009.16"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009, pp. 49\u201354. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1655108.1655117","DOI":"10.1145\/1655108.1655117"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Eldefrawy, K., Rattanavipanon, N., Tsudik, G.: Hydra: hybrid design for remote attestation (using a formally verified microkernel). In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, pp. 99\u2013110. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3098243.3098261","DOI":"10.1145\/3098243.3098261"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Francillon, A., Nguyen, Q., Rasmussen, K.B., Tsudik, G.: A minimalist approach to remote attestation. In: 2014 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE2014.257"},{"key":"17_CR13","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: NDSS (2003)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Gevargizian, J., Kulkarni, P.: Msrr: measurement framework for remote attestation. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), Dependable, Autonomic and Secure Computing (DASC 2018), pp. 748\u2013753 (2018)","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00130"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-35705-3_2","volume-title":"Unifying Theories of Programming","author":"J Gibbons","year":"2013","unstructured":"Gibbons, J.: Unifying theories of programming\u00a0with\u00a0monads. In: Wolff, B., Gaudel, M.-C., Feliachi, A. (eds.) UTP 2012. LNCS, vol. 7681, pp. 23\u201367. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35705-3_2"},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Gill, A.: Domain-specific languages and code synthesis using Haskell. Commun. ACM 57(6), 42\u201349 (2014). https:\/\/doi.org\/10.1145\/2605205, also appeared in ACM Queue 12(4) (2014)","DOI":"10.1145\/2605205"},{"key":"17_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-30244-2_13","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"A Gopalan","year":"2012","unstructured":"Gopalan, A., Gowadia, V., Scalavino, E., Lupu, E.: Policy driven remote attestation. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. LNICST, vol. 94, pp. 148\u2013159. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30244-2_13"},{"key":"17_CR18","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: Proceedings of the Third Virtual Machine Research and Technology Symposium. San Jose, CA (2004)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-642-38088-4_27","volume-title":"NASA Formal Methods","author":"B Halling","year":"2013","unstructured":"Halling, B., Alexander, P.: Verifying a privacy CA remote attestation protocol. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 398\u2013412. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38088-4_27"},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Ho, S., Abrahamsson, O., Kumar, R., Myreen, M.O., Tan, Y.K., Norrish, M.: Proof-producing synthesis of cakeml with I\/O and local state from monadic HOL functions. In: Galmiche, D., Schulz, S., Sebastiani, R. (eds.) Automated Reasoning - 9th International Joint Conference (IJCAR). Lecture Notes in Computer Science, vol. 10900, pp. 646\u2013662. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-94205-6_42, https:\/\/cakeml.org\/ijcar18.pdf","DOI":"10.1007\/978-3-319-94205-6_42"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: Prima: Policy-reduced integrity measurement architecture. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT 2006, pp. 19\u201328. Association for Computing Machinery, New York (2006). https:\/\/doi.org\/10.1145\/1133058.1133063","DOI":"10.1145\/1133058.1133063"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In: 2009 IEEE\/IFIP International Conference on Dependable Systems Networks, pp. 115\u2013124 (2009). https:\/\/doi.org\/10.1109\/DSN.2009.5270348","DOI":"10.1109\/DSN.2009.5270348"},{"issue":"6","key":"17_CR23","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1743546.1743574","volume":"53","author":"G Klein","year":"2010","unstructured":"Klein, G., et al.: sel4: formal verification of an operating-system kernel. Commun. ACM 53(6), 107\u2013115 (2010). https:\/\/doi.org\/10.1145\/1743546.1743574","journal-title":"Commun. ACM"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Klein, G., et al.: sel4: formal verification of an os kernel. In: SOSP 2009: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 207\u2013220. ACM, New York (2009). https:\/\/doi.org\/10.1145\/1629575.1629596","DOI":"10.1145\/1629575.1629596"},{"key":"17_CR25","doi-asserted-by":"publisher","unstructured":"Koeberl, P., Schulz, S., Sadeghi, A.R., Varadharajan, V.: Trustlite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems, EuroSys 2014. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2592798.2592824","DOI":"10.1145\/2592798.2592824"},{"key":"17_CR26","doi-asserted-by":"publisher","unstructured":"Kumar, R., Myreen, M.O., Norrish, M., Owens, S.: Cakeml: a verified implementation of ml. In: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,POPL 2014, pp. 179\u2013191. ACM, New York (2014). , https:\/\/doi.org\/10.1145\/2535838.2535841","DOI":"10.1145\/2535838.2535841"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Lauer, H., Salehi, S.A., Rudolph, C., Nepal, S.: User-centered attestation for layered and decentralised systems. Workshop on Decentralized IoT Security and Standards (DISS) (2018)","DOI":"10.14722\/diss.2018.23012"},{"key":"17_CR28","doi-asserted-by":"publisher","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM workshop on Scalable trusted computing, STC 2007, pp. 21\u201329. ACM, New York (2007). https:\/\/doi.org\/10.1145\/1314354.1314362","DOI":"10.1145\/1314354.1314362"},{"key":"17_CR29","unstructured":"Maliszewski, R., Sun, N., Wang, S., Wei, J., Qiaowei, R.: Trusted boot (tboot) (2). http:\/\/sourceforge.net\/p\/tboot\/wiki\/Home\/"},{"key":"17_CR30","unstructured":"Nunes, I.D.O., Eldefrawy, K., Rattanavipanon, N., Steiner, M., Tsudik, G.: Vrased: a verified hardware\/software co-design for remote attestation. In: Proceedings of the 28th USENIX Conference on Security Symposium, SEC 2019, pp. 1429\u20131446. USENIX Association, USA (2019)"},{"key":"17_CR31","doi-asserted-by":"publisher","unstructured":"Pendergrass, J.A., Helble, S., Clemens, J., Loscocco, P.: A platform service for remote integrity measurement and attestation. In: MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/MILCOM.2018.8599735","DOI":"10.1109\/MILCOM.2018.8599735"},{"key":"17_CR32","doi-asserted-by":"publisher","unstructured":"Pendergrass, J.A., et al.: Runtime detection of userspace implants. In: MILCOM 2019\u20132019 IEEE Military Communications Conference (MILCOM), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/MILCOM47813.2019.9020783","DOI":"10.1109\/MILCOM47813.2019.9020783"},{"key":"17_CR33","doi-asserted-by":"publisher","unstructured":"Petroni, N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 103\u2013115. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1315245.1315260","DOI":"10.1145\/1315245.1315260"},{"key":"17_CR34","unstructured":"Petroni Jr, N., Fraser, T., Walters, A., Arbaugh, W.: An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In: Proceedings of the 15th USENIX Security Symposium, pp. 289\u2013304 (2006)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Petz, A., Alexander, P.: A copland attestation manager. In: Hot Topics in Science of Security (HoTSoS 2019), Nashville, TN (2019)","DOI":"10.1145\/3314058.3314060"},{"key":"17_CR36","unstructured":"Petz, A.: copland-avm, nfm21 release (2020). https:\/\/github.com\/ku-sldg\/copland-avm\/releases\/tag\/v1.0"},{"key":"17_CR37","unstructured":"Petz, A., Komp, E.: haskell-am (2020). https:\/\/github.com\/ku-sldg\/haskell-am"},{"key":"17_CR38","unstructured":"Plse, U.: Verdi (2016). https:\/\/github.com\/uwplse\/verdi"},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Ramsdell, J., et al.: Orchestrating layered attestations. In: Principles of Security and Trust (POST 2019), Prague, Czech Republic (2019)","DOI":"10.1007\/978-3-030-17138-4_9"},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Rowe, P.D.: Confining adversary actions via measurement. In: Third International Workshop on Graphical Models for Security, pp. 150\u2013166 (2016)","DOI":"10.1007\/978-3-319-46263-9_10"},{"key":"17_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-45572-3_7","volume-title":"Trust and Trustworthy Computing","author":"PD Rowe","year":"2016","unstructured":"Rowe, P.D.: Bundling evidence for layered attestation. In: Franz, M., Papadimitratos, P. (eds.) Trust 2016. LNCS, vol. 9824, pp. 119\u2013139. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45572-3_7"},{"key":"17_CR42","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementatation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium. USENIX Association, Berkeley (2004)"},{"key":"17_CR43","unstructured":"Shi, E., Perrig, A., Van Doorn, L.: Bind: A fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154\u2013168. IEEE (2005)"},{"key":"17_CR44","doi-asserted-by":"publisher","unstructured":"Tan, H., Tsudik, G., Jha, S.: Mtra: multiple-tier remote attestation in IoT networks. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139 (2017). https:\/\/doi.org\/10.1109\/CNS.2017.8228638","DOI":"10.1109\/CNS.2017.8228638"},{"key":"17_CR45","doi-asserted-by":"publisher","unstructured":"Wedaj, S., Paul, K., Ribeiro, V.J.: Dads: decentralized attestation for device swarms. ACM Trans. Priv. Secur. 22(3), 19:1\u201319:29 (2019). https:\/\/doi.org\/10.1145\/3325822","DOI":"10.1145\/3325822"},{"key":"17_CR46","doi-asserted-by":"publisher","unstructured":"Wei, J., Pu, C., Rozas, C.V., Rajan, A., Zhu, F.: Modeling the runtime integrity of cloud servers: a scoped invariant perspective. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 651\u2013658 (2010). https:\/\/doi.org\/10.1109\/CloudCom.2010.29","DOI":"10.1109\/CloudCom.2010.29"},{"key":"17_CR47","doi-asserted-by":"publisher","unstructured":"Wilcox, J.R., et al.: Verdi: a framework for implementing and formally verifying distributed systems. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2015, pp. 357\u2013368. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2737924.2737958","DOI":"10.1145\/2737924.2737958"},{"key":"17_CR48","unstructured":"Woos, D., Wilcox, J.R., Simmons, K., Palmskog, K., Doenges, R.: Structtact coq library (2020). https:\/\/github.com\/uwplse\/StructTact"},{"key":"17_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15497-3_12","volume-title":"Computer Security \u2013 ESORICS 2010","author":"W Xu","year":"2010","unstructured":"Xu, W., Ahn, G.-J., Hu, H., Zhang, X., Seifert, J.-P.: DR@FT: efficient remote attestation framework for dynamic systems. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 182\u2013198. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_12"}],"container-title":["Lecture Notes in Computer Science","NASA Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76384-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:56:05Z","timestamp":1621382165000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76384-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030763831","9783030763848"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76384-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"NASA Formal Methods Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nfm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/shemesh.larc.nasa.gov\/nfm2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}