{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T23:24:28Z","timestamp":1773098668987,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1145\/3447786.3456243","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T06:18:11Z","timestamp":1619072291000},"page":"294-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Confidential computing for OpenPOWER"],"prefix":"10.1145","author":[{"given":"Guerney D. H.","family":"Hunt","sequence":"first","affiliation":[{"name":"IBM Research"}]},{"given":"Ramachandra","family":"Pai","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Michael V.","family":"Le","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Hani","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Sukadev","family":"Bhattiprolu","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Rick","family":"Boivie","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Laurent","family":"Dufour","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Brad","family":"Frey","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Mohit","family":"Kapur","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Kenneth A.","family":"Goldman","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Ryan","family":"Grimm","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Janani","family":"Janakirman","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"John M.","family":"Ludden","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Paul","family":"Mackerras","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Cathy","family":"May","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Elaine R.","family":"Palmer","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Bharata Bhasker","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Lawrence","family":"Roy","sequence":"additional","affiliation":[{"name":"IBM Research and Oregon State University"}]},{"given":"William A.","family":"Starke","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Jeff","family":"Stuecheli","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Enriquillo","family":"Valdez","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Wendel","family":"Voigt","sequence":"additional","affiliation":[{"name":"IBM"}]}],"member":"320","published-online":{"date-parts":[[2021,4,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. In Annual Network and Distributed System Security Symposium (NDSS)","author":"Ahmad Adil","year":"2021","unstructured":"Adil Ahmad , Juhee Kim , Jaebaek Seo , Insik Shin , Pedro Fonseca , and Byoungyoung Lee . 2021 . CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. In Annual Network and Distributed System Security Symposium (NDSS) . Internet Society , 11710 Plaza America Drive, Suite 400, Reston, VA 20190. Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, and Byoungyoung Lee. 2021. CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. In Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 11710 Plaza America Drive, Suite 400, Reston, VA 20190."},{"key":"e_1_3_2_1_2_1","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation- with Integrity Protection and More. White paper. https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf  AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation- with Integrity Protection and More. White paper. https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Apache. 2021. ab - Apache HTTP server benchmarking tool. on-line. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html  Apache. 2021. ab - Apache HTTP server benchmarking tool. on-line. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"IBM POWER9\u2122 processor and system features for computing in the cognitive era","volume":"62","author":"Arimilli L. B.","year":"2018","unstructured":"L. B. Arimilli , B. Blaner , B. C. Drerup , C. F. Marino , D. E. Williams , E. N. Lais , F. A. Campisano , G. L. Guthrie , M. S. Floyd , R. B. Leavens , S. M. Willenborg , R. Kalla , and B. Abali . 2018 . IBM POWER9\u2122 processor and system features for computing in the cognitive era . Journal of Reproduction and Development 62 (2018), 1 . L. B. Arimilli, B. Blaner, B. C. Drerup, C. F. Marino, D. E. Williams, E. N. Lais, F. A. Campisano, G. L. Guthrie, M. S. Floyd, R. B. Leavens, S. M. Willenborg, R. Kalla, and B. Abali. 2018. IBM POWER9\u2122 processor and system features for computing in the cognitive era. Journal of Reproduction and Development 62 (2018), 1.","journal-title":"Journal of Reproduction and Development"},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. White paper. https:\/\/static.docs.arm.com\/genc009492\/c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf  ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. White paper. https:\/\/static.docs.arm.com\/genc009492\/c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX, Savannah, GA, 689--703. Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX, Savannah, GA, 689--703."},{"key":"e_1_3_2_1_7_1","first-page":"10004","article-title":"A Pratical Guide to TPM 2.0. Apress, One New York Plaza, Suite 4600 New York","author":"Authur Will","year":"2015","unstructured":"Will Authur , David Challener , and With Kenneth Goldman . 2015 . A Pratical Guide to TPM 2.0. Apress, One New York Plaza, Suite 4600 New York , NY 10004 - 11562 . https:\/\/www.apress.com\/us\/book\/9781430265832 Will Authur, David Challener, and With Kenneth Goldman. 2015. A Pratical Guide to TPM 2.0. Apress, One New York Plaza, Suite 4600 New York, NY 10004-1562. https:\/\/www.apress.com\/us\/book\/9781430265832","journal-title":"NY"},{"key":"e_1_3_2_1_8_1","unstructured":"Jens Axboe. 2020. fio. github.com. https:\/\/github.com\/axboe\/fio There are 187 contributors to this repo.  Jens Axboe. 2020. fio. github.com. https:\/\/github.com\/axboe\/fio There are 187 contributors to this repo."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_12_1","volume-title":"Mohit Kapur, Mehmet Kayaalp, Elaine Palmer, Dimitrios Pendarakis, David Safford, and Ray Valdez.","author":"Boivie Richard","year":"2017","unstructured":"Richard Boivie , Ek Ekanadham , Bhushan Jain , Eric Hall , Guerney D H Hunt , Mohit Kapur, Mehmet Kayaalp, Elaine Palmer, Dimitrios Pendarakis, David Safford, and Ray Valdez. 2017 . Hardware Support For Malware Defense and End-To-End Trust. Technical Report. IBM T. J. Watson Research Center . Richard Boivie, Ek Ekanadham, Bhushan Jain, Eric Hall, Guerney D H Hunt, Mohit Kapur, Mehmet Kayaalp, Elaine Palmer, Dimitrios Pendarakis, David Safford, and Ray Valdez. 2017. Hardware Support For Malware Defense and End-To-End Trust. Technical Report. IBM T. J. Watson Research Center."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2020.3008109"},{"key":"e_1_3_2_1_16_1","volume-title":"SANCTUARY: ARMing TrustZone with User-space Enclaves. In 26th Annual Network and Distributed System Security Symposium, (NDSS)","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser , David Gens , Patrick Jauernig , Ahmad-Reza Sadeghi , and Emmanuel Stapf . 2019 . SANCTUARY: ARMing TrustZone with User-space Enclaves. In 26th Annual Network and Distributed System Security Symposium, (NDSS) . Internet Society , 11710 Plaza America Drive, Suite 400 Reston, VA 20190, Session 1A: Mobile Security. Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with User-space Enclaves. In 26th Annual Network and Distributed System Security Symposium, (NDSS). Internet Society, 11710 Plaza America Drive, Suite 400 Reston, VA 20190, Session 1A: Mobile Security."},{"key":"e_1_3_2_1_17_1","volume-title":"Using the TPM NVRAM to Protect Secure Boot Keys in OpenPOWER. (August","author":"Carvalho Claudia","year":"2018","unstructured":"Claudia Carvalho . 2018. Using the TPM NVRAM to Protect Secure Boot Keys in OpenPOWER. (August 2018 ). https:\/\/www.youtube.com\/watch?v=8baIs5h-tI4&list=UL8baIs5h-tI4&index=269 Linux Security Summit NA. Claudia Carvalho. 2018. Using the TPM NVRAM to Protect Secure Boot Keys in OpenPOWER. (August 2018). https:\/\/www.youtube.com\/watch?v=8baIs5h-tI4&list=UL8baIs5h-tI4&index=269 Linux Security Summit NA."},{"key":"e_1_3_2_1_18_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia","year":"2017","unstructured":"Chia che Tsai , Donald E. Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . USENIX, Santa Clara, CA, 645--658. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai Chia che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX, Santa Clara, CA, 645--658. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353535.1346284"},{"key":"e_1_3_2_1_20_1","unstructured":"Scone Confidential Computing. 2021. https:\/\/sconedocs.github.io\/sconify_image  Scone Confidential Computing. 2021. https:\/\/sconedocs.github.io\/sconify_image"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463891.1463912"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptol. ePrint Arch. 2016 , 86 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1--118.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_23_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_24_1","first-page":"389","article-title":"Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM conference on Computer and communications security. ACM, 1601 Broadway, 10th Floor New York","volume":"10019","author":"Dwoskin Jeffrey S","year":"2007","unstructured":"Jeffrey S Dwoskin and Ruby B Lee . 2007 . Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM conference on Computer and communications security. ACM, 1601 Broadway, 10th Floor New York , NY 10019-7434 , 389 -- 400 . Jeffrey S Dwoskin and Ruby B Lee. 2007. Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM conference on Computer and communications security. ACM, 1601 Broadway, 10th Floor New York, NY 10019-7434, 389--400.","journal-title":"NY"},{"key":"e_1_3_2_1_25_1","volume-title":"Nael Abu Ghazaleh, and Ryan Riley","author":"Evtyushkin Dmitry","year":"2014","unstructured":"Dmitry Evtyushkin , Jesse Elwell , Meltem Ozsoy , Dmitry Ponomarev , Nael Abu Ghazaleh, and Ryan Riley . 2014 . Iso-x : A flexible architecture for hardware-managed isolated execution. In 2014 47th Annual kilburn1961atlas\/ACM International Symposium on Microarchitecture. IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA , 190--202. Dmitry Evtyushkin, Jesse Elwell, Meltem Ozsoy, Dmitry Ponomarev, Nael Abu Ghazaleh, and Ryan Riley. 2014. Iso-x: A flexible architecture for hardware-managed isolated execution. In 2014 47th Annual kilburn1961atlas\/ACM International Symposium on Microarchitecture. IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA, 190--202."},{"key":"e_1_3_2_1_26_1","unstructured":"Kenneth G. Goldman. 2015. IBM's TPM 2.0 TSS. https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/  Kenneth G. Goldman. 2015. IBM's TPM 2.0 TSS. https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870255"},{"key":"e_1_3_2_1_28_1","volume-title":"Family 2.0 (level 00, revision 01.59 ed.)","author":"Trusted Computing Group","unstructured":"Trusted Computing Group . 2019. Trusted Platform Module Library Specification , Family 2.0 (level 00, revision 01.59 ed.) . Trusted Computing Group , 3855 SW 153rd Drive, Beaverton, Oregon 97003. https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/ Trusted Computing Group. 2019. Trusted Platform Module Library Specification, Family 2.0 (level 00, revision 01.59 ed.). Trusted Computing Group, 3855 SW 153rd Drive, Beaverton, Oregon 97003. https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/"},{"key":"e_1_3_2_1_29_1","volume-title":"Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms. In 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","author":"G\u00f6ttel C.","unstructured":"C. G\u00f6ttel , R. Pires , I. Rocha , S. Vaucher , P. Felber , M. Pasin , and V. Schiavoni . 2018. Security , Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms. In 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS) ( Salvador, Brazil). IEEE Computer Society, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA, 133--142. C. G\u00f6ttel, R. Pires, I. Rocha, S. Vaucher, P. Felber, M. Pasin, and V. Schiavoni. 2018. Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms. In 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS) (Salvador, Brazil). IEEE Computer Society, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA, 133--142."},{"key":"e_1_3_2_1_30_1","volume-title":"Black Duck Open Hub","author":"Synopsys","year":"2020","unstructured":"Synopsys : Black Duck Open Hub . 2020 . Xen Project (Hypervisor) Statistics . on-line. https:\/\/www.openhub.net\/p\/xenproject-hypervisor\/analyses\/latest\/languages_summary Synopsys: Black Duck Open Hub. 2020. Xen Project (Hypervisor) Statistics. on-line. https:\/\/www.openhub.net\/p\/xenproject-hypervisor\/analyses\/latest\/languages_summary"},{"key":"e_1_3_2_1_32_1","unstructured":"IBM. 2020. IBM Power Systems Announces POWER10 Processor. https:\/\/www.ibm.com\/blogs\/systems\/ibm-power-systems-announces-power10-processor\/  IBM. 2020. IBM Power Systems Announces POWER10 Processor. https:\/\/www.ibm.com\/blogs\/systems\/ibm-power-systems-announces-power10-processor\/"},{"key":"e_1_3_2_1_33_1","unstructured":"IBM. 2020. IBM Reveals Next-Generation IBM POWER10 Processor. https:\/\/newsroom.ibm.com\/2020-08-17-IBM-Reveals-Next-Generation-IBM-POWER10-Processor  IBM. 2020. IBM Reveals Next-Generation IBM POWER10 Processor. https:\/\/newsroom.ibm.com\/2020-08-17-IBM-Reveals-Next-Generation-IBM-POWER10-Processor"},{"key":"e_1_3_2_1_34_1","unstructured":"IBM. 2020. Instructions to set up the PEF-enabled software stack. https:\/\/github.com\/open-power\/ultravisor\/wiki\/How-to-build-and-run-Secure-VM-using-Ultravisor-on-a-OpenPOWER-machine  IBM. 2020. Instructions to set up the PEF-enabled software stack. https:\/\/github.com\/open-power\/ultravisor\/wiki\/How-to-build-and-run-Secure-VM-using-Ultravisor-on-a-OpenPOWER-machine"},{"key":"e_1_3_2_1_35_1","unstructured":"IBM. 2020. PEF\/Ultravisor code. https:\/\/github.com\/open-power\/ultravisor  IBM. 2020. PEF\/Ultravisor code. https:\/\/github.com\/open-power\/ultravisor"},{"key":"e_1_3_2_1_36_1","unstructured":"IBM 2020. Power ISA \u2122 Version 3.1. IBM. soft copy distribution: https:\/\/wiki.raptorcs.com\/w\/images\/f\/f5\/PowerISA_public.v3.1.pdf.  IBM 2020. Power ISA \u2122 Version 3.1. IBM. soft copy distribution: https:\/\/wiki.raptorcs.com\/w\/images\/f\/f5\/PowerISA_public.v3.1.pdf."},{"key":"e_1_3_2_1_37_1","unstructured":"IBM. 2020. svm-build tools. https:\/\/github.com\/open-power\/svm-tools  IBM. 2020. svm-build tools. https:\/\/github.com\/open-power\/svm-tools"},{"key":"e_1_3_2_1_38_1","unstructured":"IBM. 2020. Ultravisor enabled pnor. https:\/\/github.com\/rampai\/opbuild  IBM. 2020. Ultravisor enabled pnor. https:\/\/github.com\/rampai\/opbuild"},{"key":"e_1_3_2_1_39_1","unstructured":"IBM. 2020. Ultravisor enabled skiboot. https:\/\/github.com\/rampai\/skiboot  IBM. 2020. Ultravisor enabled skiboot. https:\/\/github.com\/rampai\/skiboot"},{"key":"e_1_3_2_1_40_1","volume-title":"Architectural Specification: Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX) Module (document number: 344425-001us ed.)","year":"2020","unstructured":"Intel. 2020 . Architectural Specification: Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX) Module (document number: 344425-001us ed.) . Intel Corporation, 2200 Mission College Blvd ., Santa Clara, CA 95054-1549 USA. Intel. 2020. Architectural Specification: Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX) Module (document number: 344425-001us ed.). Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054-1549 USA."},{"key":"e_1_3_2_1_41_1","volume-title":"Intel\u00ae TDX Virtual Firmware Design Guide (document number: 344991-001us ed.)","unstructured":"Intel. 2020. Intel\u00ae TDX Virtual Firmware Design Guide (document number: 344991-001us ed.) . Intel Corporation, 2200 Mission College Blvd ., Santa Clara, CA 95054-1549 USA. Intel. 2020. Intel\u00ae TDX Virtual Firmware Design Guide (document number: 344991-001us ed.). Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054-1549 USA."},{"key":"e_1_3_2_1_42_1","volume-title":"Intel\u00ae Trust Domain CPU Architectural Extensions (document nubmber: 343754-001us ed.)","unstructured":"Intel. 2020. Intel\u00ae Trust Domain CPU Architectural Extensions (document nubmber: 343754-001us ed.) . Intel Corporation, 2200 Mission College Blvd ., Santa Clara, CA 95054-1549 USA. Intel. 2020. Intel\u00ae Trust Domain CPU Architectural Extensions (document nubmber: 343754-001us ed.). Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054-1549 USA."},{"key":"e_1_3_2_1_43_1","unstructured":"Intel. 2020. Intel\u00ae Trust Domain Extensions. White paper. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdx-whitepaper-v4.pdf  Intel. 2020. Intel\u00ae Trust Domain Extensions. White paper. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdx-whitepaper-v4.pdf"},{"key":"e_1_3_2_1_44_1","volume-title":"Linux on Power Architecture Platform Reference (advance ed.)","author":"International Business Machines Corporation 2016.","unstructured":"International Business Machines Corporation 2016. Linux on Power Architecture Platform Reference (advance ed.) . International Business Machines Corporation . https:\/\/openpowerfoundation.org\/?resource_lib=linux-on-power-architecture-platform-reference International Business Machines Corporation 2016. Linux on Power Architecture Platform Reference (advance ed.). International Business Machines Corporation. https:\/\/openpowerfoundation.org\/?resource_lib=linux-on-power-architecture-platform-reference"},{"key":"e_1_3_2_1_45_1","volume-title":"A Deep Dive into OpenPOWER Host Secure Boot. (October","author":"Jain Nayna","year":"2019","unstructured":"Nayna Jain . 2019. A Deep Dive into OpenPOWER Host Secure Boot. (October 2019 ). https:\/\/www.youtube.com\/watch?v=I0NgIRYRhtw OpenPower Summit EU. Nayna Jain. 2019. A Deep Dive into OpenPOWER Host Secure Boot. (October 2019). https:\/\/www.youtube.com\/watch?v=I0NgIRYRhtw OpenPower Summit EU."},{"key":"e_1_3_2_1_46_1","volume-title":"OpenPOWER Secureboot Host OS Key Management. (August","author":"Jain Nayna","year":"2019","unstructured":"Nayna Jain . 2019. OpenPOWER Secureboot Host OS Key Management. (August 2019 ). https:\/\/www.youtube.com\/watch?v=yfdbuzvptsg Linux Security Summit . Nayna Jain. 2019. OpenPOWER Secureboot Host OS Key Management. (August 2019). https:\/\/www.youtube.com\/watch?v=yfdbuzvptsg Linux Security Summit."},{"key":"e_1_3_2_1_47_1","volume-title":"Using Linux as a secure boot loader for OpenPOWER Servers. (October","author":"Jain Nayna","year":"2018","unstructured":"Nayna Jain and Thiago J Bauerman . 2018. Using Linux as a secure boot loader for OpenPOWER Servers. (October 2018 ). https:\/\/www.youtube.com\/watch?v=hwB1bkXQep4 Linux Security Summit Europe . Nayna Jain and Thiago J Bauerman. 2018. Using Linux as a secure boot loader for OpenPOWER Servers. (October 2018). https:\/\/www.youtube.com\/watch?v=hwB1bkXQep4 Linux Security Summit Europe."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the","author":"Kilburn Tom","year":"1961","unstructured":"Tom Kilburn , R Bruce Payne , and David J Howarth . 1961 . The ATLAS supervisor . In Proceedings of the December 12-14, 1961, eastern joint computer conference: computers-key to total systems control. Association for Computing Machinery, New York, NY, USA, 279--294. Tom Kilburn, R Bruce Payne, and David J Howarth. 1961. The ATLAS supervisor. In Proceedings of the December 12-14, 1961, eastern joint computer conference: computers-key to total systems control. Association for Computing Machinery, New York, NY, USA, 279--294."},{"key":"e_1_3_2_1_49_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014","author":"Kolan Tom","year":"2020","unstructured":"Tom Kolan , Hillel Mendelson , Vitali Sokhin , Kevin Reick , Elena Tsanko , and Greg Wetli . 2020 . Post-silicon validation of the IBM POWER9\u2122 processor. In 2020 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014 , Los Alamitos, CA 90720-1264 USA, 999--1002. Tom Kolan, Hillel Mendelson, Vitali Sokhin, Kevin Reick, Elena Tsanko, and Greg Wetli. 2020. Post-silicon validation of the IBM POWER9\u2122 processor. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA, 999--1002."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_51_1","unstructured":"Michael Larabel. 2019. Google's FS-VERITY File Authentication Call For Inclusion in Linux 5.4 Kernel. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-5.4-FS-VERITY-PR  Michael Larabel. 2019. Google's FS-VERITY File Authentication Call For Inclusion in Linux 5.4 Kernel. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-5.4-FS-VERITY-PR"},{"key":"e_1_3_2_1_52_1","unstructured":"Michael Larabel. 2020. FS-VERITY Seeing Performance Enhancements With Linux 5.6 Kernel. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-5.4-FS-VERITY-PR  Michael Larabel. 2020. FS-VERITY Seeing Performance Enhancements With Linux 5.6 Kernel. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-5.4-FS-VERITY-PR"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357005"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/641542.641543"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_58_1","volume-title":"Innovative instructions and software model for isolated execution. Hasp@ isca 10, 1","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R Savagaonkar . 2013. Innovative instructions and software model for isolated execution. Hasp@ isca 10, 1 ( 2013 ). Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. Hasp@ isca 10, 1 (2013)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/800195.805948"},{"key":"e_1_3_2_1_60_1","unstructured":"netperf. 2021. Netperf. on-line. https:\/\/github.com\/HewlettPackard\/netperf  netperf. 2021. Netperf. on-line. https:\/\/github.com\/HewlettPackard\/netperf"},{"key":"e_1_3_2_1_61_1","volume-title":"Computer system organization: the B5700\/B6700 series","author":"Organick Elliott I","unstructured":"Elliott I Organick . 2014. Computer system organization: the B5700\/B6700 series . Academic Press , 111 Fifth Avenue, New York, NY. Elliott I Organick. 2014. Computer system organization: the B5700\/B6700 series. Academic Press, 111 Fifth Avenue, New York, NY."},{"key":"e_1_3_2_1_62_1","volume-title":"Documentation: Enabling PEF, Creating SVM, and Running Performance Evaluation. on-line. https:\/\/github.com\/mvle\/eurosys2021_PEF_OpenPOWER\/wiki","author":"Pai Ramachandra","year":"2021","unstructured":"Ramachandra Pai , Michael V. Le , Guerney D. H. Hunt , and Hani Jamjoom . 2021 . Documentation: Enabling PEF, Creating SVM, and Running Performance Evaluation. on-line. https:\/\/github.com\/mvle\/eurosys2021_PEF_OpenPOWER\/wiki Ramachandra Pai, Michael V. Le, Guerney D. H. Hunt, and Hani Jamjoom. 2021. Documentation: Enabling PEF, Creating SVM, and Running Performance Evaluation. on-line. https:\/\/github.com\/mvle\/eurosys2021_PEF_OpenPOWER\/wiki"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.40"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0042-y"},{"key":"e_1_3_2_1_66_1","volume-title":"Damien Sauveron, and Emmanuel Conchon.","author":"Shepherd Carlton","year":"2016","unstructured":"Carlton Shepherd , Ghada Arfaoui , Iakovos Gurulian , Robert P Lee , Konstantinos Markantonakis , Raja Naeem Akram , Damien Sauveron, and Emmanuel Conchon. 2016 . Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA , 168--177. Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, and Emmanuel Conchon. 2016. Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, CA 90720-1264 USA, 168--177."},{"key":"e_1_3_2_1_68_1","first-page":"357","article-title":"AEGIS: architecture for tamper-evident and tamper-resistant processing. In ACM International Conference on Supercomputing 25th Anniversary Volume. ACM, 1601 Broadway, 10th Floor New York","volume":"10019","author":"Suh G Edward","year":"2003","unstructured":"G Edward Suh , Dwaine Clarke , Blaise Gassend , Marten Van Dijk , and Srinivas Devadas . 2003 . AEGIS: architecture for tamper-evident and tamper-resistant processing. In ACM International Conference on Supercomputing 25th Anniversary Volume. ACM, 1601 Broadway, 10th Floor New York , NY 10019-7434 , 357 -- 368 . G Edward Suh, Dwaine Clarke, Blaise Gassend, Marten Van Dijk, and Srinivas Devadas. 2003. AEGIS: architecture for tamper-evident and tamper-resistant processing. In ACM International Conference on Supercomputing 25th Anniversary Volume. ACM, 1601 Broadway, 10th Floor New York, NY 10019-7434, 357--368.","journal-title":"NY"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2016.7936223"},{"key":"e_1_3_2_1_70_1","volume-title":"File System-level Integrity Protection","author":"Ts'o Theodore","unstructured":"Theodore Ts'o . 2018. File System-level Integrity Protection . USENIX Association , Oakland, CA . Theodore Ts'o. 2018. File System-level Integrity Protection. USENIX Association, Oakland, CA."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"e_1_3_2_1_72_1","volume-title":"Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems. (September","author":"Wilson George","year":"2017","unstructured":"George Wilson . 2017. Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems. (September 2017 ). https:\/\/events.static.linuxfound.org\/sites\/events\/files\/slides\/opstboot-lss-2017-v7.0.pdf Linux Security Summit. George Wilson. 2017. Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems. (September 2017). https:\/\/events.static.linuxfound.org\/sites\/events\/files\/slides\/opstboot-lss-2017-v7.0.pdf Linux Security Summit."},{"key":"e_1_3_2_1_73_1","volume-title":"Open Power Secure and Trusted Boot. (December","author":"Wilson George","year":"2019","unstructured":"George Wilson . 2019. Open Power Secure and Trusted Boot. (December 2019 ). https:\/\/www.youtube.com\/watch?v=4GUddIZZ3GA Linux Security Summit . George Wilson. 2019. Open Power Secure and Trusted Boot. (December 2019). https:\/\/www.youtube.com\/watch?v=4GUddIZZ3GA Linux Security Summit."}],"event":{"name":"EuroSys '21: Sixteenth European Conference on Computer Systems","location":"Online Event United Kingdom","acronym":"EuroSys '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Sixteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447786.3456243","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447786.3456243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:10Z","timestamp":1750200070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447786.3456243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":67,"alternative-id":["10.1145\/3447786.3456243","10.1145\/3447786"],"URL":"https:\/\/doi.org\/10.1145\/3447786.3456243","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]},"assertion":[{"value":"2021-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}