{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:53:37Z","timestamp":1770141217352,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000028","name":"SRC","doi-asserted-by":"publisher","award":["2022-HW-3128"],"award-info":[{"award-number":["2022-HW-3128"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545349","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"44-54","source":"Crossref","is-referenced-by-count":4,"title":["Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution Environments"],"prefix":"10.1109","author":[{"given":"Hasini","family":"Witharana","sequence":"first","affiliation":[{"name":"University of Florida,Gainesville,Florida,USA"}]},{"given":"Debapriya","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"IBM,Austin,Texas,USA"}]},{"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Florida,Gainesville,Florida,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28694-0_47"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3578359.3593037"},{"key":"ref3","volume-title":"ARM TrustZone","year":"2023"},{"key":"ref4","volume-title":"Intel Software Guard Extensions (SGX)","year":"2023"},{"key":"ref5","volume-title":"Intel Trust Domain Extensions (TDX)","year":"2023"},{"key":"ref6","volume-title":"IBM Secure Execution","year":"2023"},{"key":"ref7","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"USENIX Security Symposium","author":"Costan","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456243"},{"key":"ref10","volume-title":"Intel Trust Domain Extensions (TDX) Security Review","year":"2023"},{"key":"ref11","volume-title":"AMD Secure Processor for Confidential Computing Security Review","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2011.5941073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077850"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087421"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3652597"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00024"},{"key":"ref21","volume-title":"Intel Trust Domain Extensions (Intel TDX) Module v1.5 Base Architecture Specification","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103180"},{"key":"ref23","volume-title":"Formally verifying trusted execution environments with uclid5","author":"Gaddamadugu","year":"2021"},{"key":"ref24","volume-title":"Weggli","year":"2023"},{"key":"ref25","volume-title":"Frama-C","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3441297"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3510578"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3565801"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-022-00129-5"},{"key":"ref30","volume-title":"System-on-Chip Security: Validation and Verification","author":"Huang","year":"2020"},{"key":"ref31","article-title":"Comprehensive specification and formal analysis of attestation mechanisms in confidential computing","volume-title":"ICE 2023 Pre-Proceedings","author":"Usarna Sardar","year":"2023"},{"key":"ref32","volume-title":"AMD Secure Encrypted Virtualization (SEV)","year":"2023"},{"key":"ref33","volume-title":"Architecture Specification: Intel Trust Domain Extensions (Intel TDX) Module","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2015.7542266"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348253"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028765"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_26"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545349.pdf?arnumber=10545349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:17:31Z","timestamp":1717906651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545349","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}