{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T05:03:24Z","timestamp":1770527004755,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456455.1456458","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Remote attestation on program execution"],"prefix":"10.1145","author":[{"given":"Liang","family":"Gu","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software, Peking University, Beijing, China"}]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University, Singapore, Singapore"}]},{"given":"Robert Huijie","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University, Singapore, Singapore"}]},{"given":"Bing","family":"Xie","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software, Peking University, Beijing, China"}]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The search for extraterrestrial intelligence project. http:\/\/setiathome.berkeley.edu.  The search for extraterrestrial intelligence project. http:\/\/setiathome.berkeley.edu."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.microsoft.com\/whdc\/winhec\/papers03.mspx","author":"AMD","year":"2003","unstructured":"AMD platform for trustworthy computing. http:\/\/www.microsoft.com\/whdc\/winhec\/papers03.mspx , 2003 . AMD platform for trustworthy computing. http:\/\/www.microsoft.com\/whdc\/winhec\/papers03.mspx, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/139669.140395"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_5_1","unstructured":"GIMPS. The great internet mersenne prime search. http:\/\/www.mersenne.org\/prime.htm 2007.  GIMPS. The great internet mersenne prime search. http:\/\/www.mersenne.org\/prime.htm 2007."},{"key":"e_1_3_2_1_6_1","first-page":"78","volume-title":"IEEE Real-Time and Embedded Technology and Applications Symposium","author":"Gu Z.","unstructured":"Z. Gu , S. Kodase , S. Wang , and K. G. Shin . A model-based approach to system-level dependency and real-time analysis of embedded software . In IEEE Real-Time and Embedded Technology and Applications Symposium , page 78 . IEEE Computer Society, 2003. Z. Gu, S. Kodase, S. Wang, and K. G. Shin. A model-based approach to system-level dependency and real-time analysis of embedded software. In IEEE Real-Time and Embedded Technology and Applications Symposium, page 78. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX.","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation|a virtual machine directed approach to trusted computing. In the Third virtual Machine Research and Technology Symposium (VM '04) . USENIX. , 2004 . V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation|a virtual machine directed approach to trusted computing. In the Third virtual Machine Research and Technology Symposium (VM '04). USENIX., 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/174146.154268"},{"key":"e_1_3_2_1_9_1","first-page":"205","volume-title":"Proceedings of 2007 USENIX Annual Technical Conference","author":"Hicks B.","year":"2007","unstructured":"B. Hicks , S. Rueda , T. Jaeger , and P. McDaniel . From trusted to secure: Building and executing applications that enforce system security . In Proceedings of 2007 USENIX Annual Technical Conference , page 205 -- 218 , 2007 . B. Hicks, S. Rueda, T. Jaeger, and P. McDaniel. From trusted to secure: Building and executing applications that enforce system security. In Proceedings of 2007 USENIX Annual Technical Conference, page 205--218, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143156"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155098"},{"key":"e_1_3_2_1_13_1","unstructured":"J. Jones. Abstract syntax tree implementation idioms. http:\/\/jerry.cs.uiuc.edu\/ plop\/plop2003\/Papers\/Jones-ImplementingASTs.pdf.  J. Jones. Abstract syntax tree implementation idioms. http:\/\/jerry.cs.uiuc.edu\/ plop\/plop2003\/Papers\/Jones-ImplementingASTs.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"SCAM, page 118","author":"Kiss A.","year":"2003","unstructured":"A. Kiss , J. Jasz , G. Lehotai , and T. Gyimothy . Interprocedural static slicing of binary executables . In SCAM, page 118 . IEEE Computer Society , 2003 . A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy. Interprocedural static slicing of binary executables. In SCAM, page 118. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. v. Doorn . Design and implementation of a tcg-based integrity measurement architecture . In Proceedings of the 13th USENIX Security Symposium , San Diego, CA, USA , August , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. v. Doorn. Design and implementation of a tcg-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_21_1","volume-title":"NAI Labs","author":"Smalley S.","year":"2001","unstructured":"S. Smalley , C. Vance , and W. Salamon . Implementing SELinux as a Linux security module. Report #01-043 , NAI Labs , Dec. 2001 . Revised May 2002. S. Smalley, C. Vance, and W. Salamon. Implementing SELinux as a Linux security module. Report #01-043, NAI Labs, Dec. 2001. Revised May 2002."},{"key":"e_1_3_2_1_22_1","unstructured":"Trusted Computing Group. Trusted platform module main specification. http:\/\/www.trustedcomputinggroup.org October 2003.  Trusted Computing Group. Trusted platform module main specification. http:\/\/www.trustedcomputinggroup.org October 2003."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 11th USENIX Security Symposium. USENIX","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. Kroah-Hartman . Linux Security Modules: General security support for the Linux kernel . In Proceedings of the 11th USENIX Security Symposium. USENIX , Aug. 2002 . C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux Security Modules: General security support for the Linux kernel. In Proceedings of the 11th USENIX Security Symposium. USENIX, Aug. 2002."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1193214.1194056"},{"key":"e_1_3_2_1_25_1","first-page":"486","volume-title":"COMPSAC","author":"Zhao J.","year":"2000","unstructured":"J. Zhao . Dependence analysis of java bytecode . In COMPSAC , pages 486 -- 491 . IEEE Computer Society , 2000 . J. Zhao. Dependence analysis of java bytecode. In COMPSAC, pages 486--491. IEEE Computer Society, 2000."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","location":"Alexandria Virginia USA","acronym":"CCS08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456455.1456458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":25,"alternative-id":["10.1145\/1456455.1456458","10.1145\/1456455"],"URL":"https:\/\/doi.org\/10.1145\/1456455.1456458","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}