{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:33Z","timestamp":1750307133371,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046712","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"17-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Unicorn"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Mannan","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Beom Heyn","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"Afshar","family":"Ganjali","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"David","family":"Lie","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Phishing activity trends report: 1st quarter","author":"Anti-Phishing Working Group (APWG).","year":"2010","unstructured":"Anti-Phishing Working Group (APWG). Phishing activity trends report: 1st quarter 2010 . BiBTeXhttp :\/\/www.antiphishing.org\/reports\/apwg_report_Q1_2010.pdf. Anti-Phishing Working Group (APWG). Phishing activity trends report: 1st quarter 2010. BiBTeXhttp:\/\/www.antiphishing.org\/reports\/apwg_report_Q1_2010.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium","author":"Balfanz D.","year":"1999","unstructured":"D. Balfanz and E. Felten . Hand-held computers can be better smart cards . In USENIX Security Symposium , Washington, DC, USA , Aug. 1999 . D. Balfanz and E. Felten. Hand-held computers can be better smart cards. In USENIX Security Symposium, Washington, DC, USA, Aug. 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920296"},{"volume-title":"Zeus trojan mobile variant intercepts SMS passcodes from bank sites. News article (Feb. 22","year":"2011","key":"e_1_3_2_1_6_1","unstructured":"eWeek.com. Zeus trojan mobile variant intercepts SMS passcodes from bank sites. News article (Feb. 22 , 2011 ). eWeek.com. Zeus trojan mobile variant intercepts SMS passcodes from bank sites. News article (Feb. 22, 2011)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378623"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179481"},{"key":"e_1_3_2_1_10_1","volume-title":"The Intel Safer Computing Initiative: Building Blocks for Trusted Computing","author":"Grawrock D.","year":"2006","unstructured":"D. Grawrock . The Intel Safer Computing Initiative: Building Blocks for Trusted Computing . Intel Press , 2006 . D. Grawrock. The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Intel Press, 2006."},{"volume-title":"Hacker extracts crypto key from TPM chip. News article (Feb. 10","year":"2010","key":"e_1_3_2_1_11_1","unstructured":"H-online.com. Hacker extracts crypto key from TPM chip. News article (Feb. 10 , 2010 ). H-online.com. Hacker extracts crypto key from TPM chip. News article (Feb. 10, 2010)."},{"volume-title":"Intel trusted execution technology (TXT) software development guide. Technical article (Dec","year":"2009","key":"e_1_3_2_1_12_1","unstructured":"Intel. Intel trusted execution technology (TXT) software development guide. Technical article (Dec . 2009 ). BiBTeXhttp :\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf. Intel. Intel trusted execution technology (TXT) software development guide. Technical article (Dec. 2009). BiBTeXhttp:\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf."},{"volume-title":"Trusted boot. Open-source project (version","year":"2010","key":"e_1_3_2_1_13_1","unstructured":"Intel. Trusted boot. Open-source project (version Oct. 5, 2010 ). BiBTeXhttp :\/\/sourceforge.net\/projects\/tboot\/. Intel. Trusted boot. Open-source project (version Oct. 5, 2010). BiBTeXhttp:\/\/sourceforge.net\/projects\/tboot\/."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium","author":"Kauer B.","year":"2007","unstructured":"B. Kauer . OSLO : Improving the security of trusted computing . In USENIX Security Symposium , Boston, MA, USA , Aug. 2007 . B. Kauer. OSLO: Improving the security of trusted computing. In USENIX Security Symposium, Boston, MA, USA, Aug. 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_16_1","volume-title":"NDSS'11","author":"Libonati A.","year":"2011","unstructured":"A. Libonati , J. M. McCune , and M. K. Reiter . Usability testing a malware-resistant input mechanism . In NDSS'11 , San Diego, CA, USA , Feb. 2011 . A. Libonati, J. M. McCune, and M. K. Reiter. Usability testing a malware-resistant input mechanism. In NDSS'11, San Diego, CA, USA, Feb. 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Annual Technical Conference","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In USENIX Annual Technical Conference , Boston, MA, USA , June 2001 . P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conference, Boston, MA, USA, June 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011219"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_21_1","volume-title":"NDSS'09","author":"McCune J. M.","year":"2009","unstructured":"J. M. McCune , A. Perrig , and M. K. Reiter . Safe passage for passwords and other sensitive data . In NDSS'09 , San Diego, CA, USA , Feb. 2009 . J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS'09, San Diego, CA, USA, Feb. 2009."},{"key":"e_1_3_2_1_22_1","volume-title":"Reboot Linux faster using kexec. IBM technical library (May 4","author":"Nellitheertha H.","year":"2004","unstructured":"H. Nellitheertha . Reboot Linux faster using kexec. IBM technical library (May 4 , 2004 ). BiBTeXhttp :\/\/www.ibm.com\/developerworks\/linux\/library\/l-kexec.html. H. Nellitheertha. Reboot Linux faster using kexec. IBM technical library (May 4, 2004). BiBTeXhttp:\/\/www.ibm.com\/developerworks\/linux\/library\/l-kexec.html."},{"key":"e_1_3_2_1_23_1","unstructured":"J. R. Okajima. Advanced multi layered unification filesystem. Open-source project (version 2.1). BiBTeXhttp:\/\/aufs.sourceforge.net\/.  J. R. Okajima. Advanced multi layered unification filesystem. Open-source project (version 2.1). BiBTeXhttp:\/\/aufs.sourceforge.net\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In USENIX Security Symposium , San Diego, CA, USA , Aug. 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, San Diego, CA, USA, Aug. 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866315"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1118613"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_20"},{"key":"e_1_3_2_1_30_1","volume-title":"Sept. 19","author":"Linux A","year":"2010","unstructured":"A squashed read-only file system for Linux . Open-source project (version 4.1 , Sept. 19 , 2010 ). BiBTeXhttp :\/\/squashfs.sourceforge.net\/. A squashed read-only file system for Linux. Open-source project (version 4.1, Sept. 19, 2010). BiBTeXhttp:\/\/squashfs.sourceforge.net\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.25"},{"key":"e_1_3_2_1_32_1","volume-title":"Workshop on Advances in Trusted Computing (WATC'06)","author":"Stumpf F.","year":"2006","unstructured":"F. Stumpf , O. Tafreschi , P. R\u00f6der , and C. Eckert . A robust integrity reporting protocol for remote attestation . In Workshop on Advances in Trusted Computing (WATC'06) , Tokyo, Japan , Nov. 2006 . F. Stumpf, O. Tafreschi, P. R\u00f6der, and C. Eckert. A robust integrity reporting protocol for remote attestation. In Workshop on Advances in Trusted Computing (WATC'06), Tokyo, Japan, Nov. 2006."},{"key":"e_1_3_2_1_33_1","unstructured":"Twisted Matrix Labs. Twisted: Event-driven networking engine. Open-source project. BiBTeXhttp:\/\/twistedmatrix.com\/trac\/wiki.  Twisted Matrix Labs. Twisted: Event-driven networking engine. Open-source project. BiBTeXhttp:\/\/twistedmatrix.com\/trac\/wiki."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.7"},{"key":"e_1_3_2_1_35_1","volume-title":"Lockdown: A safe and practical environment for security applications","author":"Vasudevan A.","year":"2009","unstructured":"A. Vasudevan , B. Parno , N. Qu , V. D. Gligor , and A. Perrig . Lockdown: A safe and practical environment for security applications . Technical Report Carnegie Mellon University-CyLab-09-011, CyLab, Carnegie Mellon University , July 2009 . BiBTeXhttp:\/\/repository.cmu.edu\/cylab\/5\/. A. Vasudevan, B. Parno, N. Qu, V. D. Gligor, and A. Perrig. Lockdown: A safe and practical environment for security applications. Technical Report Carnegie Mellon University-CyLab-09-011, CyLab, Carnegie Mellon University, July 2009. BiBTeXhttp:\/\/repository.cmu.edu\/cylab\/5\/."},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security Symposium, Washington, D.C., USA","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In USENIX Security Symposium, Washington, D.C., USA , Aug. 1999 . A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium, Washington, D.C., USA, Aug. 1999."},{"key":"e_1_3_2_1_37_1","volume-title":"Another way to circumvent Intel Trusted Execution Technology: Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation. Technical article (Dec","author":"Wojtczuk R.","year":"2009","unstructured":"R. Wojtczuk , J. Rutkowska , and A. Tereshkin . Another way to circumvent Intel Trusted Execution Technology: Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation. Technical article (Dec ., 2009 ). BiBTeXhttp :\/\/theinvisiblethings.blogspot.com\/2009\/12\/another-txt-attack.html. R. Wojtczuk, J. Rutkowska, and A. Tereshkin. Another way to circumvent Intel Trusted Execution Technology: Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation. Technical article (Dec., 2009). BiBTeXhttp:\/\/theinvisiblethings.blogspot.com\/2009\/12\/another-txt-attack.html."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046712"}},"subtitle":["two-factor attestation for data security"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":37,"alternative-id":["10.1145\/2046707.2046712","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046712","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}