{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:07:31Z","timestamp":1776305251723,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031747755","type":"print"},{"value":"9783031747762","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74776-2_18","type":"book-chapter","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:35:37Z","timestamp":1737351337000},"page":"451-462","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Verifying Components of\u00a0Arm\u00ae Confidential Computing Architecture with\u00a0ESBMC"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0986-4150","authenticated-orcid":false,"given":"Tong","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9312-195X","authenticated-orcid":false,"given":"Shale","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0028-5440","authenticated-orcid":false,"given":"Edoardo","family":"Manino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1773-2846","authenticated-orcid":false,"given":"Gareth","family":"Stockwell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6235-4272","authenticated-orcid":false,"given":"Lucas C.","family":"Cordeiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10009-020-00564-1","volume":"23","author":"OM Alhawi","year":"2020","unstructured":"Alhawi, O.M., Rocha, H., Gadelha, M.R., Cordeiro, L.C., Batista, E.: Verification and refutation of C programs based on k-induction and invariant inference. Int. J. Softw. Tools Technol. Transfer 23(2), 115\u2013135 (2020). https:\/\/doi.org\/10.1007\/s10009-020-00564-1","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Competition on software verification and witness validation: SV-COMP 2023. In: Sankaranarayanan, S., Sharygina, N. (eds.) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol. 13994, pp. 495\u2013522. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_29","DOI":"10.1007\/978-3-031-30820-8_29"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Beyer, D.: State of the art in software verification and witness validation: SV-COMP 2024. In: 30th International Conference Tools and Algorithms for the Construction and Analysis of Systems, TACAS, Finkbeiner, B., Kovacs, L. (ed.) vol. 14572. LNCS. Springer, pp. 299\u2013329 (2024)","DOI":"10.1007\/978-3-031-57256-2_15"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Biere, A.: Bounded model checking. In: Handbook of Satisfiability, vol. 185. IOS Press, pp. 457\u2013481 (2009). https:\/\/doi.org\/10.3233\/978-1-58603-929-5-457","DOI":"10.3233\/978-1-58603-929-5-457"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Clarke, E.M., et al.: Bounded model checking using satisfiability solving. Formal Methods Syst. Des. 19(1), 7\u201334 (2001). https:\/\/doi.org\/10.1023\/A:1011276507260","DOI":"10.1023\/A:1011276507260"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cordeiro, L.C., Fischer, B., Marques-Silva, J.: SMT-based bounded model checking for embedded ANSI-C software. IEEE Trans. Softw. Eng. 38(4), 957\u2013974 (2012)","DOI":"10.1109\/TSE.2011.59"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Fox, A.C.J., et al.: A verification methodology for the arm\u0151 confidential computing architecture: from a secure specification to safe implementations. In: Proceedings of the ACM on Programming Languages, vol. 7OOPSLA1, pp. 376\u2013405 (2023). https:\/\/doi.org\/10.1145\/3586040","DOI":"10.1145\/3586040"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Gadelha, M.Y.R., Ismail, H.I., Cordeiro, L.C.: Handling loops in bounded model checking of C programs via k-induction. Int. J. Softw. Tools Technol. Transfer 19, 97\u2013114 (2017). https:\/\/doi.org\/10.1007\/s10009-015-0407-9","DOI":"10.1007\/s10009-015-0407-9"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Gadelha, M.Y.R., et al.: ESBMC 5.0: an industrial-strength C model checker. In: ASE ACM, pp. 888\u2013891 (2018)","DOI":"10.1145\/3238147.3240481"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-17502-3_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"MR Gadelha","year":"2019","unstructured":"Gadelha, M.R., Monteiro, F., Cordeiro, L., Nicole, D.: ESBMC v6.0: verifying c programs using k-induction and invariant inference. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 209\u2013213. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17502-3_15"},{"key":"18_CR11","unstructured":"Amazon Inc. AWS CBMC Viewer. https:\/\/github.com\/model-checking\/cbmc-viewer. Accessed June 2022"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Kroening, D., Strichman, O.L Decision procedures \u2013 an algorithmic point of view, 2nd edn. Texts in Theoretical Computer Science. An EATCS Series. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-50497-0","DOI":"10.1007\/978-3-662-50497-0"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-54862-8_26","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D Kroening","year":"2014","unstructured":"Kroening, D., Tautschnig, M.: CBMC \u2013 c bounded model checker. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 389\u2013391. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_26"},{"key":"18_CR14","unstructured":"Li, X., et al.: Design and verification of the arm confidential compute architecture. In: 16th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2022, Carlsbad, CA, USA, 11\u201313 July 2022. USENIX Association, pp. 465\u2013484 (2022). https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/li"},{"key":"18_CR15","unstructured":"Arm Ltd. Arm Confidential Compute Architecture. https:\/\/www.arm.com\/architecture\/security- features\/armconfidential-computearchitecture (2021)"},{"key":"18_CR16","unstructured":"Arm Ltd. Realm management monitor beta0 specification. https:\/\/developer.arm.com\/documentation\/den0137\/a\/. Accessed 25th October 2022, final version to be published 2022. 2022"},{"key":"18_CR17","unstructured":"Arm Ltd. TF-RMM Homepage. https:\/\/www.trustedfirmware.org\/ projects\/tf-rmm\/. Accessed 14 Jan 2024"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Menezes, R.S., et al.: ESBMC v7.4: harnessing the power of intervals. In: Finkbeiner, B., Kov\u00e1cs, L. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2024, LNCS, vol. 14572. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57256-2_24","DOI":"10.1007\/978-3-031-57256-2_24"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Niemetz, A., Preiner, M., Biere, A.: Boolector 2.0. J. Satisf. Boolean Model. Comput. 9(1), 53\u201358 (2014). https:\/\/doi.org\/10.3233\/SAT190101","DOI":"10.3233\/SAT190101"},{"key":"18_CR20","unstructured":"Silverstein, J.: Hundreds of millions of Facebook user records were exposed on Amazon cloud server. In: CBS News 4 (2019)"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"de Sousa, J.O., et al.: Finding software vulnerabilities in open-source c projects via bounded model checking. In: CoRR abs\/2311.05281 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2311.05281","DOI":"10.48550\/ARXIV.2311.05281"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. In: J. Netw. Comput. Appl. 34(1), 1\u201311 (2011). https:\/\/doi.org\/10.1016\/J.JNCA.2010.07.006","DOI":"10.1016\/J.JNCA.2010.07.006"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74776-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:35:42Z","timestamp":1737351342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74776-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031747755","9783031747762"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74776-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pasadena, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.splashcon.org\/home\/sas-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}