{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T12:00:51Z","timestamp":1775822451931,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["957197"],"award-info":[{"award-number":["957197"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1145\/3526059.3533618","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T22:17:11Z","timestamp":1656022631000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["WebAssembly as a Common Layer for the Cloud-edge Continuum"],"prefix":"10.1145","author":[{"given":"J\u00e4mes","family":"M\u00e9n\u00e9trey","sequence":"first","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcelo","family":"Pasin","sequence":"additional","affiliation":[{"name":"HES-SO University of Applied Sciences, Neuch\u00e2tel, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00031"},{"key":"e_1_3_2_2_2_1","unstructured":"Arm. 2019. Introducing Arm TrustZone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone.  Arm. 2019. Introducing Arm TrustZone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone."},{"key":"e_1_3_2_2_3_1","volume-title":"12th Symposium on Operating Systems Design and Implementation (OSDI '16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , 2016 . SCONE: secure Linux Containers with Intel SGX . In 12th Symposium on Operating Systems Design and Implementation (OSDI '16) . USENIX. Sergei Arnautov, Bohdan Trach, Franz Gregor, et al. 2016. SCONE: secure Linux Containers with Intel SGX. In 12th Symposium on Operating Systems Design and Implementation (OSDI '16). USENIX."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342019877383"},{"key":"e_1_3_2_2_5_1","volume-title":"3rd Symposium on Operating Systems Design and Implementation (OSDI '99)","author":"Banga Gaurav","unstructured":"Gaurav Banga and Jeffrey C. Mogul . 1999. Resource containers: a new facility for resource management in server systems . In 3rd Symposium on Operating Systems Design and Implementation (OSDI '99) . USENIX. Gaurav Banga and Jeffrey C. Mogul. 1999. Resource containers: a new facility for resource management in server systems. In 3rd Symposium on Operating Systems Design and Implementation (OSDI '99). USENIX."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3226644"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.09.005"},{"key":"e_1_3_2_2_8_1","unstructured":"Confidential computing consortium. https:\/\/confidentialcomputing.io\/projects\/.  Confidential computing consortium. https:\/\/confidentialcomputing.io\/projects\/."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3486221"},{"key":"e_1_3_2_2_10_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. IACR Cryptology ePrint Archive 86.  Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. IACR Cryptology ePrint Archive 86."},{"key":"e_1_3_2_2_11_1","unstructured":"Advanced Micro Devices. 2019. Secure Encrypted Virtualization API: Technical Preview. Technical report 55766. Advanced Micro Devices.  Advanced Micro Devices. 2019. Secure Encrypted Virtualization API: Technical Preview. Technical report 55766. Advanced Micro Devices."},{"key":"e_1_3_2_2_12_1","unstructured":"Enarx. https:\/\/enarx.io.  Enarx. https:\/\/enarx.io."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361541"},{"key":"e_1_3_2_2_14_1","unstructured":"Google. Confidential computing. https:\/\/cloud.google.com\/confidential-computing.  Google. Confidential computing. https:\/\/cloud.google.com\/confidential-computing."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134453"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_2_17_1","volume-title":"USENIX Annual Technical Conference (ATC '19)","author":"Jangda Abhinav","year":"2019","unstructured":"Abhinav Jangda , Bobby Powers , Emery D. Berger , 2019 . Not so fast: analyzing the performance of WebAssembly vs. native code . In USENIX Annual Technical Conference (ATC '19) . Abhinav Jangda, Bobby Powers, Emery D. Berger, et al. 2019. Not so fast: analyzing the performance of WebAssembly vs. native code. In USENIX Annual Technical Conference (ATC '19)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362735"},{"key":"e_1_3_2_2_19_1","volume-title":"International Forum on Information Technology and Applications (IFITA'09)","author":"Junyan Lv","unstructured":"Lv Junyan , Xu Shiguo , and Li Yijie . 2009. Application research of embedded database SQLite . In International Forum on Information Technology and Applications (IFITA'09) . IEEE. Lv Junyan, Xu Shiguo, and Li Yijie. 2009. Application research of embedded database SQLite. In International Forum on Information Technology and Applications (IFITA'09). IEEE."},{"key":"e_1_3_2_2_20_1","volume-title":"International Symposium on Code Generation and Optimization (CGO '04)","author":"Lattner Chris","unstructured":"Chris Lattner and Vikram S. Adve . 2004. LLVM: a compilation framework for lifelong program analysis & transformation . In International Symposium on Code Generation and Optimization (CGO '04) . IEEE. Chris Lattner and Vikram S. Adve. 2004. LLVM: a compilation framework for lifelong program analysis & transformation. In International Symposium on Code Generation and Optimization (CGO '04). IEEE."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_2_22_1","unstructured":"Memory64 proposal. https:\/\/github.com\/WebAssembly\/memory64.  Memory64 proposal. https:\/\/github.com\/WebAssembly\/memory64."},{"key":"e_1_3_2_2_23_1","volume-title":"22nd IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS '22)","author":"M\u00e9n\u00e9trey J\u00e4mes","year":"2022","unstructured":"J\u00e4mes M\u00e9n\u00e9trey , Christian G\u00f6ttel , Anum Khurshid , 2022 . Attestation mechanisms for trusted execution environments demystified . In 22nd IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS '22) . Springer. J\u00e4mes M\u00e9n\u00e9trey, Christian G\u00f6ttel, Anum Khurshid, et al. 2022. Attestation mechanisms for trusted execution environments demystified. In 22nd IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS '22). Springer."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00025"},{"key":"e_1_3_2_2_25_1","volume-title":"38th International Conference on Distributed Computing Systems (ICDCS '22)","author":"M\u00e9n\u00e9trey J\u00e4mes","year":"2022","unstructured":"J\u00e4mes M\u00e9n\u00e9trey , Marcelo Pasin , Pascal Felber , 2022 . Watz: a Trusted WebAssembly runtime environment with remote attestation for TrustZone . In 38th International Conference on Distributed Computing Systems (ICDCS '22) . IEEE. J\u00e4mes M\u00e9n\u00e9trey, Marcelo Pasin, Pascal Felber, et al. 2022. Watz: a Trusted WebAssembly runtime environment with remote attestation for TrustZone. In 38th International Conference on Distributed Computing Systems (ICDCS '22). IEEE."},{"key":"e_1_3_2_2_26_1","unstructured":"Microsoft. Azure confidential computing. https:\/\/azure.microsoft.com\/en- us\/solutions\/confidential-compute\/.  Microsoft. Azure confidential computing. https:\/\/azure.microsoft.com\/en- us\/solutions\/confidential-compute\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Microsoft. Azure Sphere. https:\/\/azure.microsoft.com\/en-us\/services\/azure- sphere\/.  Microsoft. Azure Sphere. https:\/\/azure.microsoft.com\/en-us\/services\/azure- sphere\/."},{"key":"e_1_3_2_2_28_1","unstructured":"Mozilla. 2019. Standardizing WASI: a system interface to run WebAssembly outside the web. https:\/\/hacks.mozilla.org\/2019\/03\/standardizing- wasi-a-webassembly-system-interface\/.  Mozilla. 2019. Standardizing WASI: a system interface to run WebAssembly outside the web. https:\/\/hacks.mozilla.org\/2019\/03\/standardizing- wasi-a-webassembly-system-interface\/."},{"key":"e_1_3_2_2_29_1","unstructured":"Louis-No\u00ebl Pouchet etal 2018. PolyBench\/C the polyhedral benchmark suite.  Louis-No\u00ebl Pouchet et al. 2018. PolyBench\/C the polyhedral benchmark suite."},{"key":"e_1_3_2_2_30_1","unstructured":"2022. WebAssembly Core Specification. Version 2.0. W3C.  2022. WebAssembly Core Specification. Version 2.0. W3C."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"e_1_3_2_2_32_1","unstructured":"SQLite Speedtest1. https:\/\/sqlite.org\/cpu.html.  SQLite Speedtest1. https:\/\/sqlite.org\/cpu.html."},{"key":"e_1_3_2_2_33_1","unstructured":"Bill Venners. 1998. The Java virtual machine. Java and the Java virtual machine: definition verification validation.  Bill Venners. 1998. The Java virtual machine. Java and the Java virtual machine: definition verification validation."},{"key":"e_1_3_2_2_34_1","unstructured":"Veracruz. https:\/\/veracruz-project.com.  Veracruz. https:\/\/veracruz-project.com."},{"key":"e_1_3_2_2_35_1","unstructured":"Wasi-nn proposal. https:\/\/github.com\/WebAssembly\/wasi-nn.  Wasi-nn proposal. https:\/\/github.com\/WebAssembly\/wasi-nn."},{"key":"e_1_3_2_2_36_1","unstructured":"Wasi-parallel proposal. https:\/\/github.com\/WebAssembly\/wasi-parallel.  Wasi-parallel proposal. https:\/\/github.com\/WebAssembly\/wasi-parallel."},{"key":"e_1_3_2_2_37_1","unstructured":"WebAssembly micro runtime. https:\/\/github.com\/bytecodealliance\/wasm-micro-runtime.  WebAssembly micro runtime. https:\/\/github.com\/bytecodealliance\/wasm-micro-runtime."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048147.2048224"}],"event":{"name":"HPDC '22: The 31st International Symposium on High-Performance Parallel and Distributed Computing","location":"Minneapolis MN USA","acronym":"HPDC '22","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526059.3533618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526059.3533618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:45Z","timestamp":1750272225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526059.3533618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":38,"alternative-id":["10.1145\/3526059.3533618","10.1145\/3526059"],"URL":"https:\/\/doi.org\/10.1145\/3526059.3533618","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}