{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:59Z","timestamp":1750308419489,"version":"3.41.0"},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T00:00:00Z","timestamp":1598832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2020,8,31]]},"abstract":"<jats:p>Today's computing ecosystem, comprising commodity heterogeneous interconnected computing (CHIC) platforms, is increasingly being employed for critical applications, consequently demanding fairly strong end-to-end assurances. However, the generality and system complexity of today's CHIC stack seem to outpace existing tools and methodologies toward provable end-to-end guarantees. This paper describes our on-going research, and presents \u00fcberSpark, a system architecture that argues for structuring the CHIC stack around Universal Object Abstractions (\u00fcobjects), a fundamental system abstraction and building block towards practical and provable end-to-end guarantees.<\/jats:p>","DOI":"10.1145\/3421473.3421476","type":"journal-article","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:31:19Z","timestamp":1598880679000},"page":"8-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\u00fcberSpark"],"prefix":"10.1145","volume":"54","author":[{"given":"Amit","family":"Vasudevan","sequence":"first","affiliation":[{"name":"SEI\/Carnegie Mellon University"}]},{"given":"Petros","family":"Maniatis","sequence":"additional","affiliation":[{"name":"Google Research"}]},{"given":"Ruben","family":"Martins","sequence":"additional","affiliation":[{"name":"CSD\/Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Mach: A New Kernel Foundation for UNIX Development. In USENIX Summer","author":"Accetta Michael J.","year":"1986","unstructured":"Michael J. Accetta , Robert V. Baron , William J. Bolosky , David B. Golub , Richard F. Rashid , Avadis Tevanian , and Michael Young . 1986 . Mach: A New Kernel Foundation for UNIX Development. In USENIX Summer . USENIX Association , 93--113. Michael J. Accetta, Robert V. Baron, William J. Bolosky, David B. Golub, Richard F. Rashid, Avadis Tevanian, and Michael Young. 1986. Mach: A New Kernel Foundation for UNIX Development. In USENIX Summer. USENIX Association, 93--113."},{"volume-title":"Accessed","year":"2020","key":"e_1_2_1_2_1","unstructured":"AliveCor. 2020 . KardiaBand: Take an EKG anytime, anywhere. https: \/\/www.alivecor.com\/ . Accessed : May 28, 2020. AliveCor. 2020. KardiaBand: Take an EKG anytime, anywhere. https: \/\/www.alivecor.com\/. Accessed: May 28, 2020."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009-9123-z"},{"key":"e_1_2_1_4_1","unstructured":"Uri Alon Shaked Brody Omer Levy and Eran Yahav. 2019. code2seq: Generating Sequences from Structured Representations of Code. In ICLR (Poster). OpenReview.net.  Uri Alon Shaked Brody Omer Levy and Eran Yahav. 2019. code2seq: Generating Sequences from Structured Representations of Code. In ICLR (Poster). OpenReview.net."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2006.014859"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33693-0_6"},{"key":"e_1_2_1_7_1","volume-title":"Accessed","author":"ARM.","year":"2010","unstructured":"ARM. 2010 . Virtualization Extensions Architecture Specification. http:\/\/infocenter.arm.com . Accessed : May 28, 2020. ARM. 2010. Virtualization Extensions Architecture Specification. http:\/\/infocenter.arm.com. Accessed: May 28, 2020."},{"key":"e_1_2_1_8_1","volume-title":"Accessed","author":"ARM.","year":"2020","unstructured":"ARM. 2020 . ARM Architecture Reference Manuals. https:\/\/ developer.arm.com\/docs\/ddi0487\/fb . Accessed : May 28, 2020. ARM. 2020. ARM Architecture Reference Manuals. https:\/\/ developer.arm.com\/docs\/ddi0487\/fb. Accessed: May 28, 2020."},{"key":"e_1_2_1_9_1","volume-title":"Accessed","author":"Astah Inc.","year":"2016","unstructured":"Astah Inc. 2016 . Astah UML2C. https:\/\/astah.net\/product-plugins\/ uml2c-export\/ . Accessed : May 28, 2020. Astah Inc. 2016. Astah UML2C. https:\/\/astah.net\/product-plugins\/ uml2c-export\/. Accessed: May 28, 2020."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_12"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452044.1452047"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224077"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11813040_31"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2013.30"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241261"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032342"},{"key":"e_1_2_1_20_1","volume-title":"Accessed","author":"Medical Caretaker","year":"2018","unstructured":"Caretaker Medical . 2018 . Wireless CNIBP and Vital Signs. http: \/\/www.caretakermedical.net\/ . Accessed : May 28, 2020. 19 Caretaker Medical. 2018. Wireless CNIBP and Vital Signs. http: \/\/www.caretakermedical.net\/. Accessed: May 28, 2020. 19"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179479"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240471"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346284"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411226"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1707801.1706312"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544174.2500592"},{"volume-title":"TACAS (Lecture Notes in Computer Science)","author":"Clarke Edmund M.","key":"e_1_2_1_27_1","unstructured":"Edmund M. Clarke , Daniel Kroening , and Flavio Lerda . 2004. A Tool for Checking ANSI-C Programs . In TACAS (Lecture Notes in Computer Science) , Vol. 2988 . Springer , 168--176. Edmund M. Clarke, Daniel Kroening, and Flavio Lerda. 2004. A Tool for Checking ANSI-C Programs. In TACAS (Lecture Notes in Computer Science), Vol. 2988. Springer, 168--176."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03359-9_2"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043575"},{"key":"e_1_2_1_30_1","unstructured":"Rob Coombs. 2015. Securing the Future of Authentication with ARM TrustZone-based Trusted Execution Environment and Fast Identity Online. https:\/\/community.arm.com\/cfs-file\/__key\/telligentevolution- components-attachments\/01--2142-00-00-00-01-06- 27\/TrustZone-and-FIDO-white-paper-final.pdf. Accessed: May 28 2020.  Rob Coombs. 2015. Securing the Future of Authentication with ARM TrustZone-based Trusted Execution Environment and Fast Identity Online. https:\/\/community.arm.com\/cfs-file\/__key\/telligentevolution- components-attachments\/01--2142-00-00-00-01-06- 27\/TrustZone-and-FIDO-white-paper-final.pdf. Accessed: May 28 2020."},{"key":"e_1_2_1_31_1","unstructured":"Jonathan Corbet Greg Kroah-Hartman and Amanda McPherson. 2015. Linux Kernel Development How Fast it is Going Who is Doing It What They are Doing and Who is Sponsoring It. https:\/\/www.linuxfoundation.org\/events\/2015\/02\/linux-kerneldevelopment- how-fast-it-is-going-who-is-doing-it-what-theyare- doing-and-who-is-sponsoring-it-2015\/. The Linux Foundation (2015). Accessed: May 28 2020.  Jonathan Corbet Greg Kroah-Hartman and Amanda McPherson. 2015. Linux Kernel Development How Fast it is Going Who is Doing It What They are Doing and Who is Sponsoring It. https:\/\/www.linuxfoundation.org\/events\/2015\/02\/linux-kerneldevelopment- how-fast-it-is-going-who-is-doing-it-what-theyare- doing-and-who-is-sponsoring-it-2015\/. The Linux Foundation (2015). Accessed: May 28 2020."},{"key":"e_1_2_1_32_1","volume-title":"Accessed","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation . 2016 . Intel Architecture Software Developer Manual. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/ intel-sdm.html . Accessed : May 28, 2020. Intel Corporation. 2016. Intel Architecture Software Developer Manual. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/ intel-sdm.html. Accessed: May 28, 2020."},{"key":"e_1_2_1_33_1","volume-title":"Accessed","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation . 2016 . Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/ 48\/88\/329298-002.pdf . Accessed : May 28, 2020. Intel Corporation. 2016. Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/ 48\/88\/329298-002.pdf. Accessed: May 28, 2020."},{"key":"e_1_2_1_34_1","unstructured":"Intel Corporation. 2019. Intel Trusted Execution Technology -- Software Development Guide. http:\/\/cqcontent.intel.com\/content\/ dam\/www\/public\/us\/en\/documents\/guides\/intel-txt-softwaredevelopment- guide.pdf Document number 315168-016. Accessed: May 28 2020.  Intel Corporation. 2019. Intel Trusted Execution Technology -- Software Development Guide. http:\/\/cqcontent.intel.com\/content\/ dam\/www\/public\/us\/en\/documents\/guides\/intel-txt-softwaredevelopment- guide.pdf Document number 315168-016. Accessed: May 28 2020."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294295"},{"key":"e_1_2_1_36_1","volume-title":"Moreno","author":"de Niz Dionisio","year":"2019","unstructured":"Dionisio de Niz , Bj\u00f6rn Andersson , Mark H. Klein , John P. Lehoczky , A. Vasudevan , Hyoseung Kim , and Gabriel A . Moreno . 2019 . Mixed- Trust Computing for Real-Time Systems. In RTCSA. IEEE , 1--11. Dionisio de Niz, Bj\u00f6rn Andersson, Mark H. Klein, John P. Lehoczky, A. Vasudevan, Hyoseung Kim, and Gabriel A. Moreno. 2019. Mixed- Trust Computing for Real-Time Systems. In RTCSA. IEEE, 1--11."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224076"},{"key":"e_1_2_1_38_1","volume-title":"Accessed","author":"Zurich ETH","year":"2018","unstructured":"ETH Zurich and Microsoft Research . 2018 . Barrelfish OS. http: \/\/www.barrelfish.org\/ . Accessed : May 28, 2020. ETH Zurich and Microsoft Research. 2018. Barrelfish OS. http: \/\/www.barrelfish.org\/. Accessed: May 28, 2020."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217953"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192382"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093333.3009851"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770379"},{"key":"e_1_2_1_44_1","volume-title":"Accessed","author":"US Food and Drug Administration","year":"2011","unstructured":"US Food and Drug Administration . 2011 . Philips IntelliVue GuardianSoftware Rev A.00. https:\/\/www.accessdata.fda.gov\/ cdrh_docs\/pdf11\/K111905.pdf . Accessed : May 28, 2020. US Food and Drug Administration. 2011. Philips IntelliVue GuardianSoftware Rev A.00. https:\/\/www.accessdata.fda.gov\/ cdrh_docs\/pdf11\/K111905.pdf. Accessed: May 28, 2020."},{"key":"e_1_2_1_45_1","volume-title":"Accessed","author":"US Food and Drug Administration","year":"2018","unstructured":"US Food and Drug Administration . 2018 . Philips IntelliVue GuardianSoftware Rev D.0. https:\/\/www.accessdata.fda.gov\/ cdrh_docs\/pdf18\/K180534.pdf . Accessed : May 28, 2020. US Food and Drug Administration. 2018. Philips IntelliVue GuardianSoftware Rev D.0. https:\/\/www.accessdata.fda.gov\/ cdrh_docs\/pdf18\/K180534.pdf. Accessed: May 28, 2020."},{"key":"e_1_2_1_46_1","volume-title":"Accessed","author":"Team C","year":"2015","unstructured":"Frama- C Team . 2015 . ACSL: ANSI\/ISO C Specification Language v1.9. http:\/\/www.frama-c.com . Accessed : May 28, 2020. Frama-C Team. 2015. ACSL: ANSI\/ISO C Specification Language v1.9. http:\/\/www.frama-c.com. Accessed: May 28, 2020."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.29"},{"volume-title":"A Retrospective on the Security of a Hypervisor","author":"Franklin Jason","key":"e_1_2_1_48_1","unstructured":"Jason Franklin , Arvind Seshadri , Ning Qu , Sagar Chaki , and Anupam Datta . 2008. Attacking, Repairing, and Verifying SecVisor : A Retrospective on the Security of a Hypervisor . Technical Report Carnegie Mellon UniversityCyLab- 08-008. Carnegie Mellon University CyLab . Jason Franklin, Arvind Seshadri, Ning Qu, Sagar Chaki, and Anupam Datta. 2008. Attacking, Repairing, and Verifying SecVisor: A Retrospective on the Security of a Hypervisor. Technical Report Carnegie Mellon UniversityCyLab- 08-008. Carnegie Mellon University CyLab."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2010.08.005"},{"key":"e_1_2_1_51_1","volume-title":"Accessed","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . 2003 . Trusted platform module main specification, Version 1.2, Revision 103. https:\/\/ trustedcomputinggroup.org\/resource\/tpm-main-specification\/ . Accessed : May 28, 2020. Trusted Computing Group. 2003. Trusted platform module main specification, Version 1.2, Revision 103. https:\/\/ trustedcomputinggroup.org\/resource\/tpm-main-specification\/. Accessed: May 28, 2020."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2676975"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026928"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172403"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/996821.996830"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/362258.362278"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993536"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187671.2187678"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068608"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685062"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987588"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133615"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_2_1_66_1","volume-title":"Accessed","author":"Directorate Information Assurance","year":"2007","unstructured":"Information Assurance Directorate . 2007 . US Government Protection Profile for Separation Kernels in Environments Requiring High Robustness. https:\/\/www.niap-ccevs.org\/Profile\/Info.cfm?PPID= 65&id=65. (2007) . Accessed : May 28, 2020. Information Assurance Directorate. 2007. US Government Protection Profile for Separation Kernels in Environments Requiring High Robustness. https:\/\/www.niap-ccevs.org\/Profile\/Info.cfm?PPID= 65&id=65. (2007). Accessed: May 28, 2020."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.38"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2676966"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28869-2_20"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/269005.266644"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505879.2505897"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0326-7"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560537"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314368"},{"key":"e_1_2_1_76_1","volume-title":"Accessed","author":"Lamport Leslie","year":"2019","unstructured":"Leslie Lamport . 2019 . The TLA+ home page. https:\/\/ lamport.azurewebsites.net\/tla\/tla.html . Accessed : May 28, 2020. Leslie Lamport. 2019. The TLA+ home page. https:\/\/ lamport.azurewebsites.net\/tla\/tla.html. Accessed: May 28, 2020."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05089-3_51"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111320.1111042"},{"key":"e_1_2_1_79_1","volume-title":"ICTCS (CEUR Workshop Proceedings)","volume":"1231","author":"Li Chao","year":"2014","unstructured":"Chao Li , Liang Dou , and Zongyuan Yang . 2014 . A metamodeling level transformation from UML sequence diagrams to Coq . In ICTCS (CEUR Workshop Proceedings) , Vol. 1231 . CEUR-WS.org, 147--157. Chao Li, Liang Dou, and Zongyuan Yang. 2014. A metamodeling level transformation from UML sequence diagrams to Coq. In ICTCS (CEUR Workshop Proceedings), Vol. 1231. CEUR-WS.org, 147--157."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168633"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/234215.234473"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026882"},{"volume-title":"Accessed","year":"2018","key":"e_1_2_1_84_1","unstructured":"Macworld. 2018 . Apple Watch's heart rate sensor can detect diabetes, Cardiogram study finds. https:\/\/www.macworld.com\/article\/ 3253341\/cardiogram-diabetes-apple-watch.html . Accessed : May 28, 2020. Macworld. 2018. Apple Watch's heart rate sensor can detect diabetes, Cardiogram study finds. https:\/\/www.macworld.com\/article\/ 3253341\/cardiogram-diabetes-apple-watch.html. Accessed: May 28, 2020."},{"key":"e_1_2_1_85_1","volume-title":"Accessed","author":"March\u00e9 Claude","year":"2020","unstructured":"Claude March\u00e9 , Guillaume Melquiond , Andrei Paskevich , and et al. 2013. The why3 platform. http:\/\/why3.lri.fr\/ . Accessed : May 28, 2020 . Claude March\u00e9, Guillaume Melquiond, Andrei Paskevich, and et al. 2013. The why3 platform. http:\/\/why3.lri.fr\/. Accessed: May 28, 2020."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278142.3278144"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.2151012"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267351"},{"volume-title":"HotEdge","author":"McCormack Matt","key":"e_1_2_1_89_1","unstructured":"Matt McCormack , Amit Vasudevan , Guyue Liu , Sebasti\u00e1n Echeverr\u00eda , Kyle O'Meara , Grace Lewis , and Vyas Sekar . 2020. Towards an Architecture for Trusted Edge IoT Security Gateways . In HotEdge . USENIX Association . Matt McCormack, Amit Vasudevan, Guyue Liu, Sebasti\u00e1n Echeverr\u00eda, Kyle O'Meara, Grace Lewis, and Vyas Sekar. 2020. Towards an Architecture for Trusted Edge IoT Security Gateways. In HotEdge. USENIX Association."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_2_1_92_1","unstructured":"Mike King. 2018. Smart Technology Takes Hold in Retirement Communities. https:\/\/www.nextavenue.org\/smart-technologyretirement- communities\/. Accessed: May 28 2020.  Mike King. 2018. Smart Technology Takes Hold in Retirement Communities. https:\/\/www.nextavenue.org\/smart-technologyretirement- communities\/. Accessed: May 28 2020."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254111"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387516"},{"key":"e_1_2_1_95_1","volume-title":"Accessed","author":"O'Flynn Colin","year":"2017","unstructured":"Colin O'Flynn . 2017 . Breaking Electronic Door Locks like you're on CSI: CYBER. https:\/\/www.blackhat.com\/docs\/us-17\/wednesday\/us- 17-OFlynn-Breaking-Electronic-Locks.pdf. Black Hat USA (2017) . Accessed : May 28, 2020. Colin O'Flynn. 2017. Breaking Electronic Door Locks like you're on CSI: CYBER. https:\/\/www.blackhat.com\/docs\/us-17\/wednesday\/us- 17-OFlynn-Breaking-Electronic-Locks.pdf. Black Hat USA (2017). Accessed: May 28, 2020."},{"key":"e_1_2_1_96_1","volume-title":"Proc. AAAI Fall Symposium: AI in Eldercare: New Solutions to Old Problems. AAAI, 70--77","author":"Park Sangho","year":"2008","unstructured":"Sangho Park and Henry A Kautz . 2008 . Privacy-Preserving Recognition of Activities in Daily Living from Multi-view Silhouettes and RFID-based Training . In Proc. AAAI Fall Symposium: AI in Eldercare: New Solutions to Old Problems. AAAI, 70--77 . Sangho Park and Henry A Kautz. 2008. Privacy-Preserving Recognition of Activities in Daily Living from Multi-view Silhouettes and RFID-based Training. In Proc. AAAI Fall Symposium: AI in Eldercare: New Solutions to Old Problems. AAAI, 70--77."},{"volume-title":"IntelliVue Guardian EWS: Automated Early-warning scoring system. https:\/\/www.usa.philips.com\/healthcare\/clinicalsolutions\/ early-warning-scoring\/intellivue-guardian-ews. Accessed: 21","year":"2020","key":"e_1_2_1_97_1","unstructured":"Philips. 2019. IntelliVue Guardian EWS: Automated Early-warning scoring system. https:\/\/www.usa.philips.com\/healthcare\/clinicalsolutions\/ early-warning-scoring\/intellivue-guardian-ews. Accessed: 21 May 28, 2020 . Philips. 2019. IntelliVue Guardian EWS: Automated Early-warning scoring system. https:\/\/www.usa.philips.com\/healthcare\/clinicalsolutions\/ early-warning-scoring\/intellivue-guardian-ews. Accessed: 21 May 28, 2020."},{"key":"e_1_2_1_98_1","unstructured":"Philips. 2019. Intellivue Guardian Software Solution: Keep Watch and Intervene Early. http:\/\/images.philips.com\/is\/content\/PhilipsConsumer\/Campaigns\/ HC20140401_DG\/Documents\/en_US\/20190225-intellivue-guardiansoftware-igs-solution-brochure.pdf. Accessed: May 28 2020.  Philips. 2019. Intellivue Guardian Software Solution: Keep Watch and Intervene Early. http:\/\/images.philips.com\/is\/content\/PhilipsConsumer\/Campaigns\/ HC20140401_DG\/Documents\/en_US\/20190225-intellivue-guardiansoftware-igs-solution-brochure.pdf. Accessed: May 28 2020."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241160"},{"key":"e_1_2_1_100_1","unstructured":"Alvin Rajkomar Eyal Oren Kai Chen Andrew M Dai Nissan Hajaj Michaela Hardt Peter J Liu Xiaobing Liu Jake Marcus Mimi Sun etal 2018. Scalable and accurate deep learning for electronic health records. CoRR abs\/1801.07860 (2018).  Alvin Rajkomar Eyal Oren Kai Chen Andrew M Dai Nissan Hajaj Michaela Hardt Peter J Liu Xiaobing Liu Jake Marcus Mimi Sun et al. 2018. Scalable and accurate deep learning for electronic health records. CoRR abs\/1801.07860 (2018)."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806586"},{"key":"e_1_2_1_102_1","volume-title":"Adve","author":"Sahoo Swarup Kumar","year":"2013","unstructured":"Swarup Kumar Sahoo , John Criswell , Chase Geigle , and Vikram S . Adve . 2013 . Using likely invariants for automated software fault localization. In ASPLOS. ACM , 139--152. Swarup Kumar Sahoo, John Criswell, Chase Geigle, and Vikram S. Adve. 2013. Using likely invariants for automated software fault localization. In ASPLOS. ACM, 139--152."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594834.1480929"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451150"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929822"},{"key":"e_1_2_1_106_1","volume-title":"Khosla","author":"Seshadri Arvind","year":"2007","unstructured":"Arvind Seshadri , Mark Luk , Adrian Perrig , Leendert van Doom , and Pradeep K . Khosla . 2007 . Pioneer : Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. In Malware Detection. Springer , 253--289. Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doom, and Pradeep K. Khosla. 2007. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. In Malware Detection. Springer, 253--289."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294294"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/319344.319163"},{"key":"e_1_2_1_109_1","volume-title":"USENIX Annual Technical Conference. USENIX Association.","author":"Sigurbjarnarson Helgi","year":"2017","unstructured":"Helgi Sigurbjarnarson , James Bornholt , Nicolas Christin , and Lorrie Faith Cranor . 2017 . Push-Button Verification of File Systems via Crash Refinement . In USENIX Annual Technical Conference. USENIX Association. Helgi Sigurbjarnarson, James Bornholt, Nicolas Christin, and Lorrie Faith Cranor. 2017. Push-Button Verification of File Systems via Crash Refinement. In USENIX Annual Technical Conference. USENIX Association."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291168.3291190"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217951"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908113"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125811"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.5555\/648238.751554"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298482"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019390"},{"key":"e_1_2_1_120_1","volume-title":"Accessed","author":"Depot The Home","year":"2019","unstructured":"The Home Depot . 2019 . Schlage Smart Door Locks. https:\/\/www.homedepot.com\/b\/Smart-Home-Smart-Home- Security-Smart-Locks\/Schlage\/N-5yc1vZc7byZ1c3 . Accessed : May 28, 2020. The Home Depot. 2019. Schlage Smart Door Locks. https:\/\/www.homedepot.com\/b\/Smart-Home-Smart-Home- Security-Smart-Locks\/Schlage\/N-5yc1vZc7byZ1c3. Accessed: May 28, 2020."},{"key":"e_1_2_1_121_1","volume-title":"Accessed","author":"Designer UML","year":"2018","unstructured":"UML Designer . 2018 . UML to Java generator and reverse. http: \/\/www.umldesigner.org\/ref-doc\/umlgen.html . Accessed : May 28, 2020. UML Designer. 2018. UML to Java generator and reverse. http: \/\/www.umldesigner.org\/ref-doc\/umlgen.html. Accessed: May 28, 2020."},{"volume-title":"EuroS&P","author":"Vasudevan Amit","key":"e_1_2_1_122_1","unstructured":"Amit Vasudevan and Sagar Chaki . 2018. Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform . In EuroS&P . IEEE , 183--198. Amit Vasudevan and Sagar Chaki. 2018. Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform. In EuroS&P. IEEE, 183--198."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241102"},{"key":"e_1_2_1_125_1","volume-title":"Lockdown: A Safe and Practical Environment for Security Applications","author":"Vasudevan Amit","year":"2009","unstructured":"Amit Vasudevan , Bryan Parno , Ning Qu , Virgil D. Gligor , and Adrian Perrig . 2009 . Lockdown: A Safe and Practical Environment for Security Applications . Technical Report Carnegie Mellon University-CyLab-09-011. Carnegie Mellon University CyLab . Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, and Adrian Perrig. 2009. Lockdown: A Safe and Practical Environment for Security Applications. Technical Report Carnegie Mellon University-CyLab-09-011. Carnegie Mellon University CyLab."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_3"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060308"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/355616.364017"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043197"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359647"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421473.3421476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421473.3421476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:21Z","timestamp":1750268961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421473.3421476"}},"subtitle":["Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms"],"short-title":[],"issued":{"date-parts":[[2020,8,31]]},"references-count":133,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,8,31]]}},"alternative-id":["10.1145\/3421473.3421476"],"URL":"https:\/\/doi.org\/10.1145\/3421473.3421476","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2020,8,31]]},"assertion":[{"value":"2020-08-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}