{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:55:35Z","timestamp":1752360935475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MURI","award":["FA9550-12-1-0040"],"award-info":[{"award-number":["FA9550-12-1-0040"]}]},{"name":"NSF","award":["CCF-0424422"],"award-info":[{"award-number":["CCF-0424422"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897895","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"687-698","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Attestation Transparency"],"prefix":"10.1145","author":[{"given":"Jethro G.","family":"Beekman","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"John L.","family":"Manferdelli","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"w3","author":"Akhawe D.","year":"2015","unstructured":"D. Akhawe , F. Marier , F. Braun , and J. Weinberger . Subresource Integrity. W3C working draft, W3C , July 2015 . URL: http:\/\/www. w3 .org\/TR\/SRI\/. D. Akhawe, F. Marier, F. Braun, and J. Weinberger. Subresource Integrity. W3C working draft, W3C, July 2015. URL: http:\/\/www.w3.org\/TR\/SRI\/.","journal-title":"Subresource Integrity. W3C working draft, W3C"},{"key":"e_1_3_2_1_2_1","first-page":"429","volume-title":"21st USENIX Security Symposium","author":"Akhawe D.","year":"2012","unstructured":"D. Akhawe , P. Saxena , and D. Song . Privilege Separation in HTML5 Applications . In 21st USENIX Security Symposium , pages 429 -- 444 . USENIX, Aug. 2012 . D. Akhawe, P. Saxena, and D. Song. Privilege Separation in HTML5 Applications. In 21st USENIX Security Symposium, pages 429--444. USENIX, Aug. 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","author":"Anati I.","year":"2013","unstructured":"I. Anati , S. Gueron , S. Johnson , and V. Scarlata . Innovative Technology for CPU Based Attestation and Sealing . In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy , 2013 . I. Anati, S. Gueron, S. Johnson, and V. Scarlata. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_1_5_1","volume-title":"IBM Research Report","author":"Boivie R.","year":"2013","unstructured":"R. Boivie and P. Williams . SecureBlue++: CPU support for secure execution. Technical report , IBM Research Report , 2013 . R. Boivie and P. Williams. SecureBlue++: CPU support for secure execution. Technical report, IBM Research Report, 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_7_1","volume-title":"May","author":"Cooper D.","year":"2008","unstructured":"D. Cooper , S. Santesson , S. Farrell , S. Boeyen , R. Housley , and W. Polk . Internet X.509 Public Key Infrastructure Certi cate and Certi cate Revocation List (CRL) Pro le. RFC 5280 (Proposed Standard) , May 2008 . Updated by RFC 6818. URL : http:\/\/www.ietf.org\/rfc\/rfc5280.txt. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certi cate and Certi cate Revocation List (CRL) Pro le. RFC 5280 (Proposed Standard), May 2008. Updated by RFC 6818. URL: http:\/\/www.ietf.org\/rfc\/rfc5280.txt."},{"key":"e_1_3_2_1_9_1","volume-title":"A court order is an insider attack","author":"Felten E.","year":"2013","unstructured":"E. Felten . A court order is an insider attack , 2013 . URL : https:\/\/freedom-to-tinker.com\/blog\/felten\/a-court-order-is-an-insider-attack\/. E. Felten. A court order is an insider attack, 2013. URL: https:\/\/freedom-to-tinker.com\/blog\/felten\/a-court-order-is-an-insider-attack\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_11_1","volume-title":"How much will PRISM cost the U.S. cloud computing industry?","author":"Technology Information","year":"2013","unstructured":"Information Technology and Innovation Foundation . How much will PRISM cost the U.S. cloud computing industry? , 2013 . URL : http:\/\/www.itif.org\/2013-cloud-computing-costs.pdf. Information Technology and Innovation Foundation. How much will PRISM cost the U.S. cloud computing industry?, 2013. URL: http:\/\/www.itif.org\/2013-cloud-computing-costs.pdf."},{"key":"e_1_3_2_1_12_1","volume-title":"October","author":"Intel Corporation","year":"2014","unstructured":"Intel Corporation . Intel Software Guard Extensions Programming Reference , October 2014 . Intel Corporation. Intel Software Guard Extensions Programming Reference, October 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"Intel Software Guard Extensions Enclave Writer's Guide","author":"Intel Corporation","year":"2015","unstructured":"Intel Corporation . Intel Software Guard Extensions Enclave Writer's Guide , 2015 . Intel Corporation. Intel Software Guard Extensions Enclave Writer's Guide, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"June","author":"Laurie B.","year":"2013","unstructured":"B. Laurie , A. Langley , and E. Kasper . Certi cate Transparency. RFC 6962 (Experimental) , June 2013 . URL : http:\/\/www.ietf.org\/rfc\/rfc6962.txt. B. Laurie, A. Langley, and E. Kasper. Certi cate Transparency. RFC 6962 (Experimental), June 2013. URL: http:\/\/www.ietf.org\/rfc\/rfc6962.txt."},{"key":"e_1_3_2_1_15_1","volume-title":"Final post on Javascript crypto","author":"Lawson N.","year":"2010","unstructured":"N. Lawson . Final post on Javascript crypto , 2010 . URL : http:\/\/rdist.root.org\/2010\/11\/29\/final-post-on-javascript-crypto\/. N. Lawson. Final post on Javascript crypto, 2010. URL: http:\/\/rdist.root.org\/2010\/11\/29\/final-post-on-javascript-crypto\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"e_1_3_2_1_20_1","volume-title":"Javascript Cryptography Considered Harmful","author":"Ptacek T.","year":"2011","unstructured":"T. Ptacek . Javascript Cryptography Considered Harmful , 2011 . URL : http:\/\/www.matasano.com\/articles\/javascript-cryptography\/. T. Ptacek. Javascript Cryptography Considered Harmful, 2011. URL: http:\/\/www.matasano.com\/articles\/javascript-cryptography\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Rust programming language. https:\/\/www.rust-lang.org\/.  Rust programming language. https:\/\/www.rust-lang.org\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Mar.","author":"Saint-Andre P.","year":"2011","unstructured":"P. Saint-Andre and J. Hodges . Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certi cates in the Context of Transport Layer Security (TLS). RFC 6125 (Proposed Standard) , Mar. 2011 . URL : http:\/\/www.ietf.org\/rfc\/rfc6125.txt. P. Saint-Andre and J. Hodges. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certi cates in the Context of Transport Layer Security (TLS). RFC 6125 (Proposed Standard), Mar. 2011. URL: http:\/\/www.ietf.org\/rfc\/rfc6125.txt."},{"key":"e_1_3_2_1_23_1","first-page":"w3","author":"Sleevi R.","year":"2014","unstructured":"R. Sleevi and M. Watson . Web Cryptography API. W3C candidate recommendation, W3C , Dec. 2014 . URL: http:\/\/www. w3 .org\/TR\/WebCryptoAPI\/. R. Sleevi and M. Watson. Web Cryptography API. W3C candidate recommendation, W3C, Dec. 2014. URL: http:\/\/www.w3.org\/TR\/WebCryptoAPI\/.","journal-title":"Web Cryptography API. W3C candidate recommendation, W3C"},{"key":"e_1_3_2_1_24_1","volume-title":"The cost of PRISM will be larger than ITIF projects. Forrester Research","author":"Staten J.","year":"2013","unstructured":"J. Staten . The cost of PRISM will be larger than ITIF projects. Forrester Research , 2013 . URL : http:\/\/blogs.forrester.com\/jamesstaten\/13-08-14-thecostofprismwillbelargerthanitifprojects. J. Staten. The cost of PRISM will be larger than ITIF projects. Forrester Research, 2013. URL: http:\/\/blogs.forrester.com\/jamesstaten\/13-08-14-thecostofprismwillbelargerthanitifprojects."},{"key":"e_1_3_2_1_25_1","volume-title":"Black Hat USA 2013","author":"Stone P.","year":"2013","unstructured":"P. Stone . Pixel perfect timing attacks with HTML5 . Presented at Black Hat USA 2013 , 2013 . URL: http:\/\/www.contextis.com\/documents\/2\/BrowserTimingAttacks.pdf. P. Stone. Pixel perfect timing attacks with HTML5. Presented at Black Hat USA 2013, 2013. URL: http:\/\/www.contextis.com\/documents\/2\/BrowserTimingAttacks.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/174613.174614"},{"key":"e_1_3_2_1_28_1","unstructured":"Zetetic LLC. SQLCipher. https:\/\/www.zetetic.net\/sqlcipher\/.  Zetetic LLC. SQLCipher. https:\/\/www.zetetic.net\/sqlcipher\/."}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:01Z","timestamp":1750223221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897895"}},"subtitle":["Building secure Internet services for legacy clients"],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":26,"alternative-id":["10.1145\/2897845.2897895","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897895","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}