{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:49:25Z","timestamp":1757540965372,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["ICRI-CARS"],"award-info":[{"award-number":["ICRI-CARS"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NordSecMob"},{"DOI":"10.13039\/501100003406","name":"Tekes","doi-asserted-by":"publisher","award":["3881\/31\/2016"],"award-info":[{"award-number":["3881\/31\/2016"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3234518","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Keys in the Clouds"],"prefix":"10.1145","author":[{"given":"Arseny","family":"Kurnikov","sequence":"first","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Andrew","family":"Paverd","sequence":"additional","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Aalto University, Finland"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/aws.amazon.com\/cloudhsm\/","author":"AWS","year":"2017","unstructured":"Amazon. 2017. AWS CloudHSM. ( 2017 ). https:\/\/aws.amazon.com\/cloudhsm\/ . Amazon. 2017. AWS CloudHSM. (2017). https:\/\/aws.amazon.com\/cloudhsm\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939932"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190547"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152713"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_7_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Conference on Offensive Technologies.","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Conference on Offensive Technologies. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Conference on Offensive Technologies."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. RFC4880: OpenPGP Message Format. (2007). https:\/\/tools.ietf.org\/html\/rfc4880.  J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. RFC4880: OpenPGP Message Format. (2007). https:\/\/tools.ietf.org\/html\/rfc4880.","DOI":"10.17487\/rfc4880"},{"key":"e_1_3_2_1_9_1","unstructured":"Somnath Chakrabarti Brandon Baker and Mona Vij. 2017. Intel SGX Enabled Key Manager Service with OpenStack Barbican. (2017). https:\/\/arxiv.org\/abs\/1712.07694.  Somnath Chakrabarti Brandon Baker and Mona Vij. 2017. Intel SGX Enabled Key Manager Service with OpenStack Barbican. (2017). https:\/\/arxiv.org\/abs\/1712.07694."},{"key":"e_1_3_2_1_10_1","unstructured":"CloudPing. 2018. (2018). http:\/\/www.cloudping.info\/.  CloudPing. 2018. (2018). http:\/\/www.cloudping.info\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Clifford Cocks. 1998. Split generation of RSA parameters with multiple participants. (1998). https:\/\/www.gchq.gov.uk\/split-generation-rsa-parameters-multiple-participants.  Clifford Cocks. 1998. Split generation of RSA parameters with multiple participants. (1998). https:\/\/www.gchq.gov.uk\/split-generation-rsa-parameters-multiple-participants.","DOI":"10.1007\/BFb0024452"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411","author":"Alliance FIDO","year":"2017","unstructured":"FIDO Alliance . 2017. Universal 2nd Factor (U2F) 1.2 Specifications . ( 2017 ). https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411 . FIDO Alliance. 2017. Universal 2nd Factor (U2F) 1.2 Specifications. (2017). https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/github.com\/guardianproject\/gnupg-for-android","author":"Android Gnu Privacy","year":"2018","unstructured":"Gnu Privacy Guard for Android . 2018. ( 2018 ). https:\/\/github.com\/guardianproject\/gnupg-for-android . Gnu Privacy Guard for Android. 2018. (2018). https:\/\/github.com\/guardianproject\/gnupg-for-android."},{"key":"e_1_3_2_1_14_1","unstructured":"Fortanix. 2017. Self-Defending Key Management Service. (2017). https:\/\/www.fortanix.com\/products\/sdkms.  Fortanix. 2017. Self-Defending Key Management Service. (2017). https:\/\/www.fortanix.com\/products\/sdkms."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.gnupg.org\/","author":"Privacy The Gnu","year":"2018","unstructured":"The Gnu Privacy Guard (GnuPG). 2018. ( 2018 ). https:\/\/www.gnupg.org\/ . The Gnu Privacy Guard (GnuPG). 2018. (2018). https:\/\/www.gnupg.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2017. Google Cloud Key Management Service. (2017). https:\/\/cloud.google.com\/kms\/.  Google. 2017. Google Cloud Key Management Service. (2017). https:\/\/cloud.google.com\/kms\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2017. 1U System Delivering Cryptographic Isolation Technology. (2017). https:\/\/www.intel.com\/content\/www\/us\/en\/data-center-blocks\/business\/secure-enclaves-blocks.html.  Intel. 2017. 1U System Delivering Cryptographic Isolation Technology. (2017). https:\/\/www.intel.com\/content\/www\/us\/en\/data-center-blocks\/business\/secure-enclaves-blocks.html."},{"key":"e_1_3_2_1_20_1","unstructured":"Intel. 2017. Software Guard Extensions (Intel SGX). (2017). https:\/\/software.intel.com\/en-us\/sgx.  Intel. 2017. Software Guard Extensions (Intel SGX). (2017). https:\/\/software.intel.com\/en-us\/sgx."},{"key":"e_1_3_2_1_21_1","unstructured":"Intel. 2018. SGX Reference: sgx_get_trusted_time. (2018). https:\/\/software.intel.com\/en-us\/node\/709158.  Intel. 2018. SGX Reference: sgx_get_trusted_time. (2018). https:\/\/software.intel.com\/en-us\/node\/709158."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053034"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2025968.2026000"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186101"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In USENIX Security Symposium. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884440"},{"key":"e_1_3_2_1_27_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. In USENIX Security. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity17\/sec17-matetic.pdf","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . 2017 . ROTE: Rollback Protection for Trusted Execution. In USENIX Security. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity17\/sec17-matetic.pdf Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In USENIX Security. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity17\/sec17-matetic.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/367177.367199"},{"key":"e_1_3_2_1_29_1","unstructured":"Microsoft. 2017. Azure Key Vault. (2017). https:\/\/azure.microsoft.com\/en-us\/services\/key-vault\/.  Microsoft. 2017. Azure Key Vault. (2017). https:\/\/azure.microsoft.com\/en-us\/services\/key-vault\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4226"},{"key":"e_1_3_2_1_31_1","volume-title":"TOTP: Time-Based One-Time Password Algorithm.","author":"M'Raihi D.","year":"2011","unstructured":"D. M'Raihi , S. Machani , M. Pei , and J. Rydell . 2011 . RFC 6238: TOTP: Time-Based One-Time Password Algorithm. (2011). https:\/\/tools.ietf.org\/html\/rfc6238. D. M'Raihi, S. Machani, M. Pei, and J. Rydell. 2011. RFC6238: TOTP: Time-Based One-Time Password Algorithm. (2011). https:\/\/tools.ietf.org\/html\/rfc6238."},{"volume-title":"https:\/\/www.openkeychain.org\/","year":"2018","key":"e_1_3_2_1_32_1","unstructured":"OpenKeychain. 2018. ( 2018 ). https:\/\/www.openkeychain.org\/ . OpenKeychain. 2018. (2018). https:\/\/www.openkeychain.org\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Joanna Rutkowska. 2018. Invisible Things Blog. (2018). https:\/\/blog.invisiblethings.org\/keys\/.  Joanna Rutkowska. 2018. Invisible Things Blog. (2018). https:\/\/blog.invisiblethings.org\/keys\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In NDSS.  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In NDSS.","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053006"},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/www.arm.com\/products\/security-on-arm\/trustzone","author":"TrustZone ARM","year":"2018","unstructured":"ARM TrustZone . 2018. ( 2018 ). https:\/\/www.arm.com\/products\/security-on-arm\/trustzone . ARM TrustZone. 2018. (2018). https:\/\/www.arm.com\/products\/security-on-arm\/trustzone."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium.","author":"Bulck J Van","year":"2017","unstructured":"J Van Bulck , N Weichbrodt , R Kapitza , F Piessens , and R Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In USENIX Security Symposium. J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, and R Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/trezor.io","author":"Trezor Bitcoin","year":"2018","unstructured":"Trezor Bitcoin wallet. 2018. ( 2018 ). https:\/\/trezor.io . Trezor Bitcoin wallet. 2018. (2018). https:\/\/trezor.io."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/www.gnupg.org\/documentation\/manuals\/assuan\/","author":"Assuan Developing","year":"2018","unstructured":"Developing with Assuan . 2018. ( 2018 ). https:\/\/www.gnupg.org\/documentation\/manuals\/assuan\/ . Developing with Assuan. 2018. (2018). https:\/\/www.gnupg.org\/documentation\/manuals\/assuan\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"volume-title":"https:\/\/www.yubico.com\/start\/","year":"2018","key":"e_1_3_2_1_42_1","unstructured":"YubiKey. 2018. ( 2018 ). https:\/\/www.yubico.com\/start\/ . YubiKey. 2018. (2018). https:\/\/www.yubico.com\/start\/."},{"key":"e_1_3_2_1_43_1","unstructured":"Phil Zimmermann. 1994. PGP User's Guide. (1994).  Phil Zimmermann. 1994. PGP User's Guide. (1994)."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3234518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:13Z","timestamp":1750212493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234518"}},"subtitle":["Auditable Multi-device Access to Cryptographic Credentials"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":43,"alternative-id":["10.1145\/3230833.3234518","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3234518","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}