{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:21Z","timestamp":1756273221226,"version":"3.44.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130147","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"867-874","source":"Crossref","is-referenced-by-count":0,"title":["Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation Capabilities"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Fotos","sequence":"first","affiliation":[{"name":"Universitat Polit&#x00E8;cnica de Catalunya (UPC),Department of Computer Architecture,Barcelona,Spain"}]},{"given":"Stefanos","family":"Vasileiadis","sequence":"additional","affiliation":[{"name":"Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece"}]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[{"name":"Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece"}]}],"member":"263","reference":[{"author":"Birkholz","key":"ref1","article-title":"Trusted Path Routing"},{"issue":"2004","key":"ref3","first-page":"223","article-title":"Design and implementation of a tcg-based integrity measurement architecture","volume-title":"USENIX Security symposium","volume":"13","author":"Sailer"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.026"},{"key":"ref5","first-page":"487","article-title":"Container-ima: a privacypreserving integrity measurement architecture for containers","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Luo"},{"key":"ref6","first-page":"1423","article-title":"Security namespace: making linux security frameworks available to containers","volume-title":"in 27th USENIX Security Symposium (USENIX Security 18)","author":"Sun"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66504-3_12"},{"key":"ref9","first-page":"305","article-title":"vtpm: virtualizing the trusted platform module","volume-title":"Proc. 15th Conf. on USENIX Security Symposium","author":"Perez"},{"author":"Ken","key":"ref10","article-title":"IBM\u2019s SW-TPM and TSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484532"},{"journal-title":"arXiv preprint arXiv:2102.06972","article-title":"Bpfcontain: Fixing the soft underbelly of container security","author":"Findlay","key":"ref12"},{"author":"Robertson","key":"ref13","article-title":"iovisor\/bpftrace: High-level tracing language for Linux eBPF"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130147.pdf?arnumber=11130147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:05:20Z","timestamp":1756271120000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130147","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}