{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:19:54Z","timestamp":1755926394265,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365337","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Execution integrity without implicit trust of system software"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Awad","sequence":"first","affiliation":[{"name":"University College London (UCL)"}]},{"given":"Brad","family":"Karp","sequence":"additional","affiliation":[{"name":"University College London (UCL)"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"volume-title":"SCONE: Secure Linux Containers with Intel SGX. In OSDI","year":"2016","author":"Arnautov S.","key":"e_1_3_2_1_1_1"},{"volume-title":"OSDI","year":"2014","author":"Baumann A.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_4_1","unstructured":"V. Costan and S. Devadas. Intel SGX explained. IACR Cryptology ePrint Archive 2016 2016.  V. Costan and S. Devadas. Intel SGX explained. IACR Cryptology ePrint Archive 2016 2016."},{"volume-title":"USENIX Security","year":"2016","author":"Costan V.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"C. Desrochers. Concurrent queue. https:\/\/github.com\/cameron314\/concurrentqueue 2018.  C. Desrochers. Concurrent queue. https:\/\/github.com\/cameron314\/concurrentqueue 2018."},{"volume-title":"PDPTA","year":"1996","author":"Dionne C.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"volume-title":"USENIX Security","year":"2017","author":"Gruss D.","key":"e_1_3_2_1_10_1"},{"volume-title":"OSDI","year":"2010","author":"Haeberlen A.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Intel. Software guidance for security advisories https:\/\/software.intel.com\/security-software-guidance\/software-guidance 2019.  Intel. Software guidance for security advisories https:\/\/software.intel.com\/security-software-guidance\/software-guidance 2019."},{"key":"e_1_3_2_1_13_1","unstructured":"D. Lee D. Kohlbrenner K. Cheang C. Rasmussen K. Laeufer I. Fang A. Khosla C.-C. Tsai S. Seshia D. Song and K. Asanovic. Keystone enclave: An open-source secure enclave for RISC-V. https:\/\/keystone-enclave.org\/files\/keystone-risc-v-summit.pdf 2018.  D. Lee D. Kohlbrenner K. Cheang C. Rasmussen K. Laeufer I. Fang A. Khosla C.-C. Tsai S. Seshia D. Song and K. Asanovic. Keystone enclave: An open-source secure enclave for RISC-V. https:\/\/keystone-enclave.org\/files\/keystone-risc-v-summit.pdf 2018."},{"volume-title":"USENIX Security","year":"2017","author":"Matetic S.","key":"e_1_3_2_1_14_1"},{"volume-title":"Inc.","year":"2001","author":"Rescorla E.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"volume-title":"OSDI","year":"2010","author":"Soares L.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132760"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.019"},{"key":"e_1_3_2_1_20_1","unstructured":"K. Vikram A. Prateek and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution.  K. Vikram A. Prateek and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution."},{"volume-title":"CCS","year":"2017","author":"Wang W.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517494"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","acronym":"SOSP '19","location":"Huntsville Ontario Canada"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":22,"alternative-id":["10.1145\/3342559.3365337","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365337","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}