{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:29:13Z","timestamp":1775179753423,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872430"],"award-info":[{"award-number":["61872430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402342"],"award-info":[{"award-number":["61402342"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772384"],"award-info":[{"award-number":["61772384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2014CB340601"],"award-info":[{"award-number":["2014CB340601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hubei Province Key Research and Development Program","award":["2020BAA003"],"award-info":[{"award-number":["2020BAA003"]}]},{"name":"Hubei Province Key Research and Development Program","award":["2021BAA027"],"award-info":[{"award-number":["2021BAA027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tcc.2023.3243891","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T19:43:00Z","timestamp":1676058180000},"page":"2936-2953","source":"Crossref","is-referenced-by-count":21,"title":["SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8813-7842","authenticated-orcid":false,"given":"Juan","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1594-9839","authenticated-orcid":false,"given":"Jie","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1573-4982","authenticated-orcid":false,"given":"Chengyang","family":"Fan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0492-3278","authenticated-orcid":false,"given":"Fei","family":"Yan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6277-340X","authenticated-orcid":false,"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"NIO Company, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7585-1075","authenticated-orcid":false,"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology (SUSTech), Shenzhen, Guangdong Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3768-1917","authenticated-orcid":false,"given":"Wenhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Infrastructure and System Lab of Applied Research Center, ByteDance Ltd., Cyber Security Lab, Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7808-852X","authenticated-orcid":false,"given":"Mengda","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-247X","authenticated-orcid":false,"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.23"},{"key":"ref57","first-page":"321","article-title":"Bluethunder: A 2-level directional predictor based side-channel attack against SGX","volume":"2020","author":"huo","year":"2020","journal-title":"IACR Trans Cryptographic Hardware Embedded Syst"},{"key":"ref12","first-page":"305","article-title":"vTPM: Virtualizing the trusted platform module","author":"berger","year":"2006","journal-title":"Proc 15th Conf USENIX Secur Symp"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"ref15","first-page":"22","article-title":"VirtinSpector: A UEFI based dynamic secure measurement framework for virtual machine","volume":"46","author":"yan","year":"2014","journal-title":"J Sichuan Univ"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"ref14","article-title":"Denali: Lightweight virtual machines for distributed and networked applications","author":"whitaker","year":"2002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.37"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_9"},{"key":"ref11","first-page":"197","article-title":"Virtual TPM for a secure cloud: Fallacy or reality?","author":"cucurull","year":"0","journal-title":"Proc RECSI"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_14"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3042433"},{"key":"ref16","author":"fioravante","year":"2012","journal-title":"The virtual trusted platform module (vTPM) subsystem for Xen"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3190493"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09622-8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s18113807"},{"key":"ref50","first-page":"133","article-title":"vTSE: A solution of SGX-based vTPM secure enhancement. Adv","volume":"49","author":"yan","year":"2017","journal-title":"Eng Sci"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WISA.2016.45"},{"key":"ref48","first-page":"841","article-title":"fTPM: A software-only implementation of a TPM Chip","author":"raj","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref47","article-title":"TaLoS: Secure and transparent TLS termination inside SGX enclaves","author":"aublin","year":"2017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354220"},{"key":"ref41","year":"0","journal-title":"Intel Intel software guard extensions (intel SGX) data center attestation primitives ECDSA quote library API"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3322205.3311076"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63406-3_16"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300030"},{"key":"ref8","author":"foley","year":"2018","journal-title":"vSphere 6 7 &#x2013; virtual trusted platform modules"},{"key":"ref7","author":"zimmerman","year":"2018","journal-title":"Virtual trusted platform module for shielded VMS Security in plaintext"},{"key":"ref9","author":"nemnonm","year":"2017","journal-title":"How to enable virtual TPM (vTPM) in windows server 2016 Hyper-V"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714610"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.125"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"ref40","first-page":"173","article-title":"SPEICHER: Securing LSM-based key-value stores using shielded execution","author":"bailleu","year":"2019","journal-title":"Proc 17th USENIX Conf File Storage Technol"},{"key":"ref35","first-page":"3111","article-title":"Repurposing segmentation as a practical LVI-NULL mitigation in SGX","author":"giner","year":"2022","journal-title":"Proc Usenix Secur Symp"},{"key":"ref34","article-title":"Securing intel SGX against side-channel attacks via load-time synthesis","author":"shih","year":"2019"},{"key":"ref37","first-page":"1","article-title":"Defending against VM rollback attack","author":"xia","year":"2012","journal-title":"Proc IEEE\/IFIP 42nd Int Conf Dependable Syst Netw Workshops"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-017-0523-0"},{"key":"ref31","article-title":"QEMU: A multihost, multitarget emulator","volume":"2006","author":"bartholomew","year":"2006","journal-title":"Linux J"},{"key":"ref30","first-page":"10","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref33","first-page":"227","article-title":"Varys: Protecting SGX enclaves from practical side-channel attacks","author":"oleksenko","year":"2018","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"ref2","author":"group","year":"2013","journal-title":"TPM library specification family 2 0 level 00 revision 01 38"},{"key":"ref1","author":"group","year":"2008","journal-title":"Trusted Platform Module (TPM) Summary"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"ref38","first-page":"1289","article-title":"ROTE: Rollback protection for trusted execution","author":"matetic","year":"2017","journal-title":"Proc 26th USENIX Secur Symp"},{"key":"ref70","first-page":"1631","article-title":"The return of coppersmith's attack: Practical factorization of widely used RSA moduli","author":"nemec","year":"2017","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref24","article-title":"Scalable paging of platform configuration registers","author":"bade","year":"2010"},{"key":"ref68","article-title":"Analyzing trusted platform communication","author":"kursawe","year":"2005","journal-title":"Proc Workshop CRASH-CRyptographic Adv Secure Hardware"},{"key":"ref23","first-page":"1229","article-title":"A bad dream: Subverting trusted platform module while you are sleeping","author":"han","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref67","first-page":"1","article-title":"Bootstrapping trust in a &#x201C;trusted&#x201D; platform","author":"parno","year":"2008","journal-title":"Proc Conf Hot Top Secur"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"ref25","author":"group","year":"2011","journal-title":"TPM Main Specification Version 1 2 Level 2 Revision 116"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04677-z"},{"key":"ref64","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","author":"gruss","year":"2017","journal-title":"Proc Usenix Secur Symp"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03621-3"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03866-1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref28","article-title":"Intel software guard extensions developer guide","year":"2016","journal-title":"Intel"},{"key":"ref27","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref29","article-title":"Intel software guard extensions SDK for Linux* OS developer reference","year":"2016","journal-title":"Intel"},{"key":"ref60","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref61","year":"2020","journal-title":"Intel SGAxe How SGX fails in practice"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10241247\/10042000.pdf?arnumber=10042000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:13:01Z","timestamp":1717693981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10042000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":70,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2023.3243891","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}