{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:34Z","timestamp":1750221274137,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T00:00:00Z","timestamp":1509148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1145\/3152701.3152705","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cobweb"],"prefix":"10.1145","author":[{"given":"Frank","family":"Wang","sequence":"first","affiliation":[{"name":"MIT"}]},{"given":"Yuna","family":"Joung","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"James","family":"Mickens","sequence":"additional","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"volume-title":"Mod apparmor. (December 10","year":"2010","key":"e_1_3_2_1_1_1","unstructured":"AppArmor. 2010. Mod apparmor. (December 10 , 2010 ). htp:\/\/wiki.apparmor.net\/index.php\/Mod_apparmor. AppArmor. 2010. Mod apparmor. (December 10, 2010). htp:\/\/wiki.apparmor.net\/index.php\/Mod_apparmor."},{"key":"e_1_3_2_1_2_1","unstructured":"T. de Paula Peixoto. 2017. graph-tool: Efficient network analysis. (2017). https:\/\/graph-tool.skewed.de\/.  T. de Paula Peixoto. 2017. graph-tool: Efficient network analysis. (2017). https:\/\/graph-tool.skewed.de\/."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/docs.docker.com\/engine\/docker-overview\/","author":"Overview Docker","year":"2017","unstructured":"Docker. 2017. Docker Overview . ( 2017 ). https:\/\/docs.docker.com\/engine\/docker-overview\/ . Docker. 2017. Docker Overview. (2017). https:\/\/docs.docker.com\/engine\/docker-overview\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_5_1","unstructured":"D. Kasatkin. 2017. Integrity Measurement Architecture (IMA). (2017). https:\/\/sourceforge.net\/p\/linux-ima\/wiki\/Home\/.  D. Kasatkin. 2017. Integrity Measurement Architecture (IMA). (2017). https:\/\/sourceforge.net\/p\/linux-ima\/wiki\/Home\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Namespaces in Operation, Part 1: Namespaces Overview. (January 4","author":"Kerrisk M.","year":"2013","unstructured":"M. Kerrisk . 2013. Namespaces in Operation, Part 1: Namespaces Overview. (January 4 2013 ). https:\/\/lwn.net\/Articles\/531114\/. M. Kerrisk. 2013. Namespaces in Operation, Part 1: Namespaces Overview. (January 4 2013). https:\/\/lwn.net\/Articles\/531114\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Libvirt Project. 2017. The Libvirt Virtualization API. (2017). https:\/\/libvirt.org\/.  Libvirt Project. 2017. The Libvirt Virtualization API. (2017). https:\/\/libvirt.org\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"e_1_3_2_1_9_1","volume-title":"Open Platform Trust Services. (May 6","author":"Munetoh S.","year":"2011","unstructured":"S. Munetoh . 2011. Open Platform Trust Services. (May 6 , 2011 ). https:\/\/osdn.net\/projects\/openpts\/wiki\/FrontPage. S. Munetoh. 2011. Open Platform Trust Services. (May 6, 2011). https:\/\/osdn.net\/projects\/openpts\/wiki\/FrontPage."},{"key":"e_1_3_2_1_10_1","unstructured":"S. Munetoh. 2011. OpenPTS Models. (December 11 2011). https:\/\/github.com\/openpts\/openpts\/tree\/master\/models.  S. Munetoh. 2011. OpenPTS Models. (December 11 2011). https:\/\/github.com\/openpts\/openpts\/tree\/master\/models."},{"key":"e_1_3_2_1_11_1","unstructured":"Oracle. 2016. Oracle Berkeley DB. (2016). htp:\/\/www.oracle.com\/technetwork\/database\/database-technologies\/berkeleydb\/overview\/index.html.  Oracle. 2016. Oracle Berkeley DB. (2016). htp:\/\/www.oracle.com\/technetwork\/database\/database-technologies\/berkeleydb\/overview\/index.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"B. Parno J.M. McCune and A. Perrig. 2011. Bootstrapping Trust in Modern Computers. (2011). https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/BootstrappingTrustBook.pdf.   B. Parno J.M. McCune and A. Perrig. 2011. Bootstrapping Trust in Modern Computers. (2011). https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/BootstrappingTrustBook.pdf.","DOI":"10.1007\/978-1-4614-1460-5"},{"key":"e_1_3_2_1_13_1","article-title":"CamFlow: Managed Data-Sharing for Cloud Services","author":"Pasquier T.","year":"2015","unstructured":"T. Pasquier , J. Singh , D. Eyers , and J. Bacon . 2015 . CamFlow: Managed Data-Sharing for Cloud Services . IEEE Transactions on Cloud Computing ( October 2015). T. Pasquier, J. Singh, D. Eyers, and J. Bacon. 2015. CamFlow: Managed Data-Sharing for Cloud Services. IEEE Transactions on Cloud Computing (October 2015).","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151052"},{"volume-title":"Proceedings of USENIX Security.","author":"Provos N.","key":"e_1_3_2_1_15_1","unstructured":"N. Provos , M. Friedl , and P. Honeyman . 2003. Preventing Privilege Escalation . In Proceedings of USENIX Security. N. Provos, M. Friedl, and P. Honeyman. 2003. Preventing Privilege Escalation. In Proceedings of USENIX Security."},{"key":"e_1_3_2_1_16_1","volume-title":"QEMU: The Fast Processor Emulator.","author":"Project QEMU","year":"2017","unstructured":"QEMU Project . 2017 . QEMU: The Fast Processor Emulator. (2017). https:\/\/www.qemu.org\/. QEMU Project. 2017. QEMU: The Fast Processor Emulator. (2017). https:\/\/www.qemu.org\/."},{"key":"e_1_3_2_1_17_1","unstructured":"E. Ratliff. 2017. AppArmor. (June 22 2017). https:\/\/wiki.ubuntu.com\/AppArmor.  E. Ratliff. 2017. AppArmor. (June 22 2017). https:\/\/wiki.ubuntu.com\/AppArmor."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Linux Security Summit.","author":"Steffen A.","year":"2011","unstructured":"A. Steffen . 2011 . The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment . In Proceedings of the Linux Security Summit. A. Steffen. 2011. The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment. In Proceedings of the Linux Security Summit."},{"key":"e_1_3_2_1_19_1","volume-title":"TCG Infrastructure Working Group Architecture Part II: Integrity Management. (November 17","author":"Trusted Computing Group","year":"2006","unstructured":"Trusted Computing Group . 2006. TCG Infrastructure Working Group Architecture Part II: Integrity Management. (November 17 , 2006 ). Specification Version 1.0, Revision 1.0. Trusted Computing Group. 2006. TCG Infrastructure Working Group Architecture Part II: Integrity Management. (November 17, 2006). Specification Version 1.0, Revision 1.0."},{"key":"e_1_3_2_1_20_1","volume-title":"TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification. (November 17","author":"Trusted Computing Group","year":"2006","unstructured":"Trusted Computing Group . 2006. TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification. (November 17 , 2006 ). Specification Version 1.0, Revision 1.0. Trusted Computing Group. 2006. TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification. (November 17, 2006). Specification Version 1.0, Revision 1.0."},{"key":"e_1_3_2_1_21_1","volume-title":"TCG Attestation PTS Protocol: Binding to TNC IF-M. (November 24","author":"Trusted Computing Group","year":"2011","unstructured":"Trusted Computing Group . 2011. TCG Attestation PTS Protocol: Binding to TNC IF-M. (November 24 , 2011 ). Specification Version 1.0, Revision 28. Trusted Computing Group. 2011. TCG Attestation PTS Protocol: Binding to TNC IF-M. (November 24, 2011). Specification Version 1.0, Revision 28."},{"key":"e_1_3_2_1_22_1","volume-title":"TCG Infrastructure Working Group Integrity Report Schema. (August 24","author":"Trusted Computing Group","year":"2011","unstructured":"Trusted Computing Group . 2011. TCG Infrastructure Working Group Integrity Report Schema. (August 24 , 2011 ). Specification Version 2.0, Revision 5. Trusted Computing Group. 2011. TCG Infrastructure Working Group Integrity Report Schema. (August 24, 2011). Specification Version 2.0, Revision 5."},{"key":"e_1_3_2_1_23_1","volume-title":"TPM Main Part 1: Design Principles. (March 1","author":"Trusted Computing Group","year":"2011","unstructured":"Trusted Computing Group . 2011. TPM Main Part 1: Design Principles. (March 1 , 2011 ). Specification Version 1.2, Revision 116. Trusted Computing Group. 2011. TPM Main Part 1: Design Principles. (March 1, 2011). Specification Version 1.2, Revision 116."},{"key":"e_1_3_2_1_24_1","volume-title":"Linux Kernel: Event Tracing Documentation.","author":"Ts'o T.","year":"2017","unstructured":"T. Ts'o , L. Zefan , and T. Zanussi . 2017 . Linux Kernel: Event Tracing Documentation. (2017). https:\/\/www.kernel.org\/doc\/Documentation\/trace\/events.txt. T. Ts'o, L. Zefan, and T. Zanussi. 2017. Linux Kernel: Event Tracing Documentation. (2017). https:\/\/www.kernel.org\/doc\/Documentation\/trace\/events.txt."},{"key":"e_1_3_2_1_25_1","volume-title":"Dirty Cow: Vulnerability Details. (October 29","author":"Wilfahrt N.","year":"2016","unstructured":"N. Wilfahrt . 2016 . Dirty Cow: Vulnerability Details. (October 29 , 2016). https:\/\/github.com\/dirtycow\/dirtycow.github.io\/wiki\/VulnerabilityDetails. N. Wilfahrt. 2016. Dirty Cow: Vulnerability Details. (October 29, 2016). https:\/\/github.com\/dirtycow\/dirtycow.github.io\/wiki\/VulnerabilityDetails."},{"volume-title":"Concurrency Attacks. In Proceedings of HotPar.","author":"Yang J.","key":"e_1_3_2_1_26_1","unstructured":"J. Yang , A. Cui , S. Stolfo , and S. Sethumadhavan . 2012 . Concurrency Attacks. In Proceedings of HotPar. J. Yang, A. Cui, S. Stolfo, and S. Sethumadhavan. 2012. Concurrency Attacks. In Proceedings of HotPar."}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Shanghai China","acronym":"SOSP '17"},"container-title":["Proceedings of the 2nd Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:09Z","timestamp":1750212669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152705"}},"subtitle":["Practical Remote Attestation Using Contextual Graphs"],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":26,"alternative-id":["10.1145\/3152701.3152705","10.1145\/3152701"],"URL":"https:\/\/doi.org\/10.1145\/3152701.3152705","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]},"assertion":[{"value":"2017-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}