{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:38:35Z","timestamp":1763811515662,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Mitacs Accelerate Cluster"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tnse.2024.3432836","type":"journal-article","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T19:53:12Z","timestamp":1721764392000},"page":"6313-6327","source":"Crossref","is-referenced-by-count":3,"title":["LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7433-050X","authenticated-orcid":false,"given":"Behnam","family":"Shobiri","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9405-8710","authenticated-orcid":false,"given":"Sajjad","family":"Pourali","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0104-2447","authenticated-orcid":false,"given":"Daniel","family":"Migault","sequence":"additional","affiliation":[{"name":"Ericsson, Montreal, QC, Canada"}]},{"given":"Ioana","family":"Boureanu","sequence":"additional","affiliation":[{"name":"Surrey Centre for Cyber Security, the Department of Computer Science, University of Surrey, Guildfordl, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5195-261X","authenticated-orcid":false,"given":"Stere","family":"Preda","sequence":"additional","affiliation":[{"name":"Ericsson, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9630-5858","authenticated-orcid":false,"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9257","article-title":"Guidance for external pre-shared key (PSK) usage in TLS","author":"Housley","year":"2022"},{"key":"ref2","first-page":"689","article-title":"SCONE: Secure linux containers with intel SGX","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Des. Implementation","author":"Arnautov","year":"2016"},{"article-title":"TaLoS: Secure and transparent TLS termination inside SGX enclaves","year":"2017","author":"Aublin","key":"ref3"},{"key":"ref4","article-title":"Delegated credentials for TLS","volume-title":"Internet Eng. Task Force, Internet-Draft Draft-Draft-Ietf-Tls-Subcerts","author":"Barnes","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8320-draft2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.52"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"ref10","first-page":"3917","article-title":"PIC leak: Architecturally leaking uninitialized data from the microarchitecture","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Borrello","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00036"},{"key":"ref12","first-page":"100","article-title":"On the pseudorandom function assumption in (secure) distance-bounding protocols - prf-ness alone does not stop the frauds!","volume-title":"Proc. Int. Conf. Cryptol. Inf. Secur. Latin Amer.","volume":"7533","author":"Boureanu","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102327"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"year":"2017","key":"ref16","article-title":"Cisco visual networking index: Forecast and methodology, 20172022"},{"key":"ref17","first-page":"841","article-title":"TeeRex: Discovery and exploitation of memory corruption vulnerabilities in SGX enclaves","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Cloosters","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-010-9187-9"},{"key":"ref19","article-title":"Intel SGX explained","volume-title":"IACR Cryptol. ePrint Arch.","volume":"2016","author":"Costan","year":"2016"},{"issue":"13s","key":"ref20","first-page":"1","article-title":"A survey and analysis of TLS interception mechanisms and motivations","volume-title":"ACM Comput. Surv.","volume":"55","author":"De Carnavalet","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102731"},{"key":"ref22","first-page":"735","article-title":"Achieving keyless CDNs with conclaves","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Herwig","year":"2020"},{"article-title":"Affected processors: Transient execution attacks & related security issues by CPU","volume-title":"Int. Secur. Center","year":"2021","key":"ref23"},{"year":"2018","key":"ref24","article-title":"Intel QuickAssist technology (intel QAT) and OpenSSL-1.1.0: Performance"},{"year":"2021","key":"ref25","article-title":"intel\/intel-sgx-ssl"},{"article-title":"Intel software guard extensions: EPID provisioning and attestation services","year":"2016","author":"Johnson","key":"ref26"},{"volume-title":"The Linux Kernel User\u2019s and Administrator\u2019s Guide, The Kernel Develop. Community","key":"ref27","article-title":"SRBDS - Special register buffer data sampling"},{"article-title":"Integrating intel SGX remote attestation with transport layer security","year":"2019","author":"Knauth","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.12"},{"key":"ref30","first-page":"285","article-title":"Glamdring: Automatic application partitioning for intel SGX","volume-title":"2017 USENIX Annu. Tech. Conf.","author":"Lind","year":"2017"},{"article-title":"Understanding TEE containers, easy to use? Hard to trust","year":"2021","author":"Liu","key":"ref31"},{"key":"ref32","article-title":"LURK extension version 1 for (D)TLS 1.3 authentication","volume-title":"Internet Eng. Task Force, Internet-Draft Draft-Draft-Mglt-Lurk-Tls13","author":"Migault","year":"2021"},{"key":"ref33","first-page":"7179","article-title":"Downfall: Exploiting speculative data gathering","volume-title":"Proc. 32nd Usenix Secur. Symp.","author":"Moghimi","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787482"},{"article-title":"SGX-LKL: Securing the host OS interface for trusted execution","year":"1908","author":"Priebe","key":"ref35"},{"year":"2018","key":"ref36","article-title":"RefTLS"},{"article-title":"CROSSTALK: Speculative data leaks across cores are real","year":"2020","author":"Ragab","key":"ref37"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8446","article-title":"The transport layer security (TLS) protocol version 1.3","author":"Rescorla","year":"2018"},{"key":"ref39","article-title":"Recommendations for secure use of transport layer security (TLS) and datagram transport layer security (DTLS)","volume":"9325","author":"Sheffer","year":"2022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.385"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112202"},{"article-title":"Intel QuickAssist technology with intel key protection technology in intel server platforms based on intel Xeon processor scalable family","year":"2017","author":"Tadepalli","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300030"},{"key":"ref45","first-page":"645","article-title":"Graphene-SGX: A practical library OS for unmodified applications on SGX","volume-title":"2017 USENIX Annu. Tech. Conf.","author":"Tsai","year":"2017"},{"article-title":"SoK: SGX.Fail: How stuff get exposed","year":"2022","author":"van Schaik","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3127482"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080208"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3464298.3493406"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/10758414\/10607961.pdf?arnumber=10607961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T23:58:54Z","timestamp":1732665534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10607961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":50,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2024.3432836","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"type":"electronic","value":"2327-4697"},{"type":"electronic","value":"2334-329X"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}