{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:48Z","timestamp":1766466228295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338511.3357347","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Bootstrapping Trust in a \"Trusted\" Virtualized Platform"],"prefix":"10.1145","author":[{"given":"Hagen","family":"Lauer","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"HIMA: A Hypervisor-Based Integrity Measurement Agent. In 2009 Annual Computer Security Applications Conference. ACSA","author":"Azab A. M.","year":"2009","unstructured":"A. M. Azab , P. Ning , E. C. Sezer , and X. Zhang . 2009 . HIMA: A Hypervisor-Based Integrity Measurement Agent. In 2009 Annual Computer Security Applications Conference. ACSA , San Juan, USA, 461--470. https:\/\/doi.org\/10.1109\/ACSAC. 2009 .50 10.1109\/ACSAC.2009.50 A. M. Azab, P. Ning , E. C. Sezer, and X. Zhang. 2009. HIMA: A Hypervisor-Based Integrity Measurement Agent. In 2009 Annual Computer Security Applications Conference. ACSA, San Juan, USA, 461--470. https:\/\/doi.org\/10.1109\/ACSAC.2009.50"},{"volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP '03)","author":"Paul","key":"e_1_3_2_1_2_1","unstructured":"Paul Barham et almbox. 2003. Xen and the Art of Virtualization . In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP '03) . ACM, New York, NY, USA, 164--177. https:\/\/doi.org\/10.1145\/945445.945462 10.1145\/945445.945462 Paul Barham et almbox. 2003. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP '03). ACM, New York, NY, USA, 164--177. https:\/\/doi.org\/10.1145\/945445.945462"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"Stefan","unstructured":"Stefan Berger et almbox. 2006. vTPM: Virtualizing the Trusted Platform Module . In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06). USENIX Association, Berkeley, CA, USA, Article 21. http:\/\/dl.acm.org\/citation.cfm?id=1267336.1267357 Stefan Berger et almbox. 2006. vTPM: Virtualizing the Trusted Platform Module. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06). USENIX Association, Berkeley, CA, USA, Article 21. http:\/\/dl.acm.org\/citation.cfm?id=1267336.1267357"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_5_1","volume-title":"mbox","author":"Giovanni Conforti","year":"2005","unstructured":"Giovanni Conforti et al mbox . 2005 . Spatial Logics for Bigraphs. In Automata, Languages and Programming . Springer Berlin Heidelberg , Berlin, Heidelberg, 766--778. Giovanni Conforti et almbox. 2005. Spatial Logics for Bigraphs. In Automata, Languages and Programming . Springer Berlin Heidelberg, Berlin, Heidelberg, 766--778."},{"key":"e_1_3_2_1_6_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076759"},{"volume-title":"Virtualized Trusted Platform Architecture Specification","author":"Trusted Computing Group","key":"e_1_3_2_1_8_1","unstructured":"Trusted Computing Group . 2011. Virtualized Trusted Platform Architecture Specification . Trusted Computing Group . Rev. 1.26. Trusted Computing Group. 2011. Virtualized Trusted Platform Architecture Specification. Trusted Computing Group. Rev. 1.26."},{"key":"e_1_3_2_1_9_1","unstructured":"Trusted Computing Group. 2014. TCG EK Credential Profile. Accessed: 2019-05-01.  Trusted Computing Group. 2014. TCG EK Credential Profile. Accessed: 2019-05-01."},{"volume-title":"Trusted Platform Module Library . ISO ISO\/IEC 11889--1:2015","author":"ISO.","key":"e_1_3_2_1_10_1","unstructured":"ISO. 2015. Trusted Platform Module Library . ISO ISO\/IEC 11889--1:2015 . International Organization for Standardization , Geneva, Switzerland . ISO. 2015. Trusted Platform Module Library . ISO ISO\/IEC 11889--1:2015. International Organization for Standardization, Geneva, Switzerland."},{"key":"e_1_3_2_1_11_1","unstructured":"ISO. 2018. ISO\/IEC NP 27070 Information Technology -- Security Techniques -- Security requirements for establishing virtualized roots of trust. https:\/\/www.iso.org\/standard\/56571.html. Accessed: 2018-10-31.  ISO. 2018. ISO\/IEC NP 27070 Information Technology -- Security Techniques -- Security requirements for establishing virtualized roots of trust. https:\/\/www.iso.org\/standard\/56571.html. Accessed: 2018-10-31."},{"key":"e_1_3_2_1_12_1","volume-title":"mbox","author":"Eric Jonas","year":"2019","unstructured":"Eric Jonas et al mbox . 2019 . Cloud Programming Simplified: A Berkeley View on Serverless Computing. arXiv e-prints, Article arXiv:1902.03383 (Feb 2019), pages arXiv:1902.03383 pages. arxiv: cs.OS\/1902.03383 Eric Jonas et almbox. 2019. Cloud Programming Simplified: A Berkeley View on Serverless Computing. arXiv e-prints, Article arXiv:1902.03383 (Feb 2019), pages arXiv:1902.03383 pages. arxiv: cs.OS\/1902.03383"},{"volume-title":"Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP '09)","author":"Gerwin","key":"e_1_3_2_1_13_1","unstructured":"Gerwin Klein et almbox. 2009. seL4: Formal Verification of an OS Kernel . In Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP '09) . ACM, New York, NY, USA, 207--220. https:\/\/doi.org\/10.1145\/1629575.1629596 10.1145\/1629575.1629596 Gerwin Klein et almbox. 2009. seL4: Formal Verification of an OS Kernel. In Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP '09). ACM, New York, NY, USA, 207--220. https:\/\/doi.org\/10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00081"},{"volume-title":"Hypervisor-Based Attestation of Virtual Environments. In Advanced and Trusted Computing (ATC), 2016 Intl IEEE Conferences. IEEE, IEEE, Toulouse, 333--340","author":"Lauer H.","key":"e_1_3_2_1_15_1","unstructured":"H. Lauer and N. Kuntze . 2016 . Hypervisor-Based Attestation of Virtual Environments. In Advanced and Trusted Computing (ATC), 2016 Intl IEEE Conferences. IEEE, IEEE, Toulouse, 333--340 . H. Lauer and N. Kuntze. 2016. Hypervisor-Based Attestation of Virtual Environments. In Advanced and Trusted Computing (ATC), 2016 Intl IEEE Conferences. IEEE, IEEE, Toulouse, 333--340."},{"key":"e_1_3_2_1_16_1","unstructured":"Andrew Martin. 2008. The ten-page introduction to Trusted Computing.  Andrew Martin. 2008. The ten-page introduction to Trusted Computing."},{"key":"e_1_3_2_1_17_1","volume-title":"The Space and Motion of Communicating Agents","author":"Milner Robin","unstructured":"Robin Milner . 2009. The Space and Motion of Communicating Agents 1 st ed.). Cambridge University Press, New York, NY , USA. Robin Milner. 2009. The Space and Motion of Communicating Agents 1st ed.). Cambridge University Press, New York, NY, USA.","edition":"1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496680"},{"volume-title":"Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS '19)","author":"Ali","key":"e_1_3_2_1_19_1","unstructured":"Ali Raza et almbox. 2019. Unikernels: The Next Stage of Linux's Dominance . In Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS '19) . ACM, New York, NY, USA, 7--13. https:\/\/doi.org\/10.1145\/3317550.3321445 10.1145\/3317550.3321445 Ali Raza et almbox. 2019. Unikernels: The Next Stage of Linux's Dominance. In Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS '19). ACM, New York, NY, USA, 7--13. https:\/\/doi.org\/10.1145\/3317550.3321445"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052975"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.025"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Sailer Reiner","year":"2004","unstructured":"Reiner Sailer , Xiaolan Zhang , Trent Jaeger , and Leendert van Doorn . 2004 . Design and Implementation of a TCG-based Integrity Measurement Architecture . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251391 Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. 2004. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251391"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991104"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Symposium on Applied Computing (SAC '17)","author":"Juhyung","year":"1961","unstructured":"Juhyung Son et almbox. 2017. Quantitative Analysis of Measurement Overhead for Integrity Verification . In Proceedings of the Symposium on Applied Computing (SAC '17) . ACM, New York, NY, USA, 1528--1533. https:\/\/doi.org\/10.1145\/30 1961 2.3019738 10.1145\/3019612.3019738 Juhyung Son et almbox. 2017. Quantitative Analysis of Measurement Overhead for Integrity Verification. In Proceedings of the Symposium on Applied Computing (SAC '17). ACM, New York, NY, USA, 1528--1533. https:\/\/doi.org\/10.1145\/3019612.3019738"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357347","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338511.3357347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:46Z","timestamp":1750203886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":24,"alternative-id":["10.1145\/3338511.3357347","10.1145\/3338511"],"URL":"https:\/\/doi.org\/10.1145\/3338511.3357347","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}