{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:48:18Z","timestamp":1772632098344,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00053","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"435-444","source":"Crossref","is-referenced-by-count":0,"title":["TPM-Based Continuous Remote Attestation and Integrity Verification for 5G VNFs on Kubernetes"],"prefix":"10.1109","author":[{"given":"Al Nahian Bin","family":"Emran","sequence":"first","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"}]},{"given":"Rajendra","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"}]},{"given":"Rajendra","family":"Paudyal","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"}]},{"given":"Lisa","family":"Donnan","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"}]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"}]}],"member":"263","reference":[{"key":"ref1","article-title":"ETSI TS 133501 V18.6.0 (2024\u201307): 5G; Security architecture and procedures for 5G System (3GPP TS 33.501 version 18.6.0 Release 18)","year":"2024","journal-title":"ETSI, Sophia Antipolis, France, Tech. Rep. RTS\/TSGS0333501v1860"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991104"},{"key":"ref3","volume-title":"k3s: Lightweight Kubernetes","year":"2025"},{"key":"ref4","volume-title":"Impact of 5g on network topology and security","author":"Toheeb","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD67323.2025.11229912"},{"key":"ref6","volume-title":"Tpm 2.0-based attestation of a kubernetes cluster","author":"Piras","year":"2022"},{"key":"ref7","volume-title":"Cloud Native Computing Foundation (CNCF)","author":"Native","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806655"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF52925.2021.00071"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN61486.2024.10637515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN64029.2025.00036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3276476"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593192"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1162"},{"key":"ref16","article-title":"Intel\u00ae trusted execution technology (intel\u00ae txt) enabling guide","year":"2014","journal-title":"Intel Corporation, Tech. Rep. Document Number: 330139\u2013001US"},{"key":"ref17","article-title":"A survey on hardware approaches for remote attestation in network infrastructures","author":"Sfyrakis","year":"2020","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3008879"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00073"},{"key":"ref20","volume-title":"Breaking out of docker via runc - explaining cve-20195736","author":"Avrahami","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SIN60469.2023.10474901"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v5i1.pp136-141"},{"key":"ref23","volume-title":"Openran security white paper","author":"Mavenir","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9442028"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3733965.3733971"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279086"},{"key":"ref27","article-title":"Linux rootkits explained part 1: Dynamic linker hijacking","author":"Mechtinger","year":"2023","journal-title":"Wiz.io Blog"},{"key":"ref28","volume-title":"MITRE ATT&CK","year":"2025"},{"key":"ref29","volume-title":"Zero trust maturity model version 2.0","year":"2023"},{"key":"ref30","volume-title":"Department of defense (dod) zero trust reference architecture","author":"Freter","year":"2022"},{"key":"ref31","volume-title":"Modeling and analyzing security protocols with Tamarin: a comprehensive guide","author":"Basin","year":"2025"},{"key":"ref32","author":"Blanchard","year":"2020","journal-title":"Introduction to c program proof with frama-c and its wp plugin"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410158.pdf?arnumber=11410158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T06:50:56Z","timestamp":1772607056000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00053","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}