{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:53:37Z","timestamp":1756000417260,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004497","name":"KU Leuven","doi-asserted-by":"publisher","award":["C16\/15\/058"],"award-info":[{"award-number":["C16\/15\/058"]}],"id":[{"id":"10.13039\/501100004497","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["695305"],"award-info":[{"award-number":["695305"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB\/TR 89"],"award-info":[{"award-number":["SFB\/TR 89"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365334","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Propagating trusted execution through mutual attestation"],"prefix":"10.1145","author":[{"given":"Furkan","family":"Turan","sequence":"first","affiliation":[{"name":"KU Leuven (Belgium)"}]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[{"name":"KU Leuven (Belgium)"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. lwIP - A Lightweight TCP\/IP stack. https:\/\/savannah.nongnu.org\/projects\/lwip\/.  2010. lwIP - A Lightweight TCP\/IP stack. https:\/\/savannah.nongnu.org\/projects\/lwip\/."},{"key":"e_1_3_2_1_2_1","volume-title":"IACR Cryptology ePrint Archive 086","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 086 ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 086 (2016)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2014.11.065"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45931-8_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2016.7856269"},{"key":"e_1_3_2_1_6_1","article-title":"Sancus 2.0: A low-cost security architecture for IoT Devices","volume":"20","author":"Noorman Job","year":"2017","unstructured":"Job Noorman , Jo Van Bulck , Jan Tobias M\u00fchlberg , Frank Piessens , Pieter Maene , Bart Preneel , Ingrid Verbauwhede , Johannes G\u00f6tzfried , Tilo M\u00fcller , and Felix Freiling . 2017 . Sancus 2.0: A low-cost security architecture for IoT Devices . ACM Transactions on Privacy and Security (TOPS) 20 , 3 (2017). Job Noorman, Jo Van Bulck, Jan Tobias M\u00fchlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes G\u00f6tzfried, Tilo M\u00fcller, and Felix Freiling. 2017. Sancus 2.0: A low-cost security architecture for IoT Devices. ACM Transactions on Privacy and Security (TOPS) 20, 3 (2017).","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_7_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE), IEEE.","author":"Reparaz Oscar","year":"2017","unstructured":"Oscar Reparaz , Josep Balasch , and Ingrid Verbauwhede . 2017 . Dude, is my code constant time?. In Design , Automation & Test in Europe Conference & Exhibition (DATE), IEEE. Oscar Reparaz, Josep Balasch, and Ingrid Verbauwhede. 2017. Dude, is my code constant time?. In Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE."},{"key":"e_1_3_2_1_8_1","volume-title":"Checking probabilistic noninterference using JOANA. it-Information Technology 56, 6","author":"Snelting Gregor","year":"2014","unstructured":"Gregor Snelting , Dennis Giffhorn , J\u00fcrgen Graf , Christian Hammer , Martin Hecker , Martin Mohr , and Daniel Wasserrab . 2014. Checking probabilistic noninterference using JOANA. it-Information Technology 56, 6 ( 2014 ). Gregor Snelting, Dennis Giffhorn, J\u00fcrgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, and Daniel Wasserrab. 2014. Checking probabilistic noninterference using JOANA. it-Information Technology 56, 6 (2014)."},{"volume-title":"Multiprocessor System-on-Chip","author":"Teich J\u00fcrgen","key":"e_1_3_2_1_9_1","unstructured":"J\u00fcrgen Teich , J\u00f6rg Henkel , Andreas Herkersdorf , Doris Schmitt-Landsiedel , Wolfgang Schr\u00f6der-Preikschat , and Gregor Snelting . 2011. Invasive computing: An overview . In Multiprocessor System-on-Chip . Springer , 241--268. J\u00fcrgen Teich, J\u00f6rg Henkel, Andreas Herkersdorf, Doris Schmitt-Landsiedel, Wolfgang Schr\u00f6der-Preikschat, and Gregor Snelting. 2011. Invasive computing: An overview. In Multiprocessor System-on-Chip. Springer, 241--268."},{"key":"e_1_3_2_1_10_1","unstructured":"Furkan Turan. 2017. Working with Zedboard. https:\/\/www.lowrisc.org\/docs\/debug-v0.3\/zedboard\/ last checked on 2019-08-20.  Furkan Turan. 2017. Working with Zedboard. https:\/\/www.lowrisc.org\/docs\/debug-v0.3\/zedboard\/ last checked on 2019-08-20."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312742"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","acronym":"SOSP '19","location":"Huntsville Ontario Canada"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":11,"alternative-id":["10.1145\/3342559.3365334","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365334","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}