{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T03:45:04Z","timestamp":1776743104619,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629124","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"316-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Trustworthy confidential virtual machines for the masses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4148-7631","authenticated-orcid":false,"given":"Anna","family":"Galanou","sequence":"first","affiliation":[{"name":"TU Dresden, Germany and DFINITY Foundation"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5718-1532","authenticated-orcid":false,"given":"Khushboo","family":"Bindlish","sequence":"additional","affiliation":[{"name":"DFINITY Foundation, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9755-3502","authenticated-orcid":false,"given":"Luca","family":"Preibsch","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0837-7948","authenticated-orcid":false,"given":"Yvonne-Anne","family":"Pignolet","sequence":"additional","affiliation":[{"name":"DFINITY Foundation, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8240-5420","authenticated-orcid":false,"given":"Christof","family":"Fetzer","sequence":"additional","affiliation":[{"name":"TU Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8116-7763","authenticated-orcid":false,"given":"R\u00fcdiger","family":"Kapitza","sequence":"additional","affiliation":[{"name":"DFINITY Foundation, Switzerland, Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_1_2_1","unstructured":"Advanced Micro Devices Inc. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00081"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Pedro Antonino Ante Derek and Wojciech Aleksander Woloszyn. 2023. Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves. arXiv:2305.09351 [cs.CR]","DOI":"10.1109\/ACCESS.2023.3308850"},{"key":"e_1_3_2_1_5_1","unstructured":"Arm Ltd. 2023. Introducing Arm Confidential Compute Architecture (Version 1). https:\/\/developer.arm.com\/documentation\/den0125\/0100."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Knut Blind Sivan P\u00e4tsch Sachiko Muto Mirko B\u00f6hm Torben Schubert Paula Grzegorzewska and Andrew Katz. 2021. The impact of Open Source Software and Hardware on technological independence competitiveness and innovation in the EU economy. https:\/\/doi.org\/10.2759\/430161","DOI":"10.2759\/430161"},{"key":"e_1_3_2_1_7_1","volume-title":"Fifth International World Wide Web Conference","volume":"6","author":"Brown Mark R.","year":"1996","unstructured":"Mark R. Brown. 1996. FastCGI: A high-performance gateway interface. In Fifth International World Wide Web Conference, Vol. 6."},{"key":"e_1_3_2_1_8_1","unstructured":"Milan Broz. 2022. DMVerity. https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/DMVerity"},{"key":"e_1_3_2_1_9_1","unstructured":"Milan Broz. 2023. Cryptsetup and LUKS - open-source disk encryption. https:\/\/gitlab.com\/cryptsetup\/cryptsetup"},{"key":"e_1_3_2_1_10_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik 2020. Security requirements for eHealth applications. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TR03161\/TR-03161.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"TODO Group (European Chapter). 2020. Why open source software matters to your enterprise. https:\/\/project.linuxfoundation.org\/hubfs\/Reports\/Why-open-source-software-matters-to-your-enterprise_090820.pdf?hsLang=en"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354220"},{"key":"e_1_3_2_1_13_1","unstructured":"CVE-2017-1000051 2017. Cross-site scripting (XSS) vulnerability in pad export in XWiki labs CryptPad before 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the pad content. National Vulnerability Database. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000051"},{"key":"e_1_3_2_1_14_1","unstructured":"Caleb James Delisle. 2017. Cryptpad Blog:Security growing pains. https:\/\/blog.cryptpad.org\/2017\/03\/06\/Security-growing-pains\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098261"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3144519.3144521"},{"key":"e_1_3_2_1_17_1","unstructured":"The Matrix.org Foundation. 2023. Matrix Specification. https:\/\/spec.matrix.org\/latest\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065917"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00063"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470535"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Lawrence E. Hughes. 2022. PKCS #10 Certificate-Signing Request (CSR). Apress Berkeley CA 75--91. https:\/\/doi.org\/10.1007\/978-1-4842-7486-6_6","DOI":"10.1007\/978-1-4842-7486-6_6"},{"key":"e_1_3_2_1_22_1","volume-title":"Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Hunt Tyler","year":"2016","unstructured":"Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. 2016. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 533--549. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/hunt"},{"key":"e_1_3_2_1_23_1","unstructured":"Intel Corp. 2021. Intel Trust Domain Extensions. Technical Report 1.0. Intel Corp. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/690419."},{"key":"e_1_3_2_1_24_1","unstructured":"Internet Security Research Group (ISRG). 2021. Rate Limits. https:\/\/letsencrypt.org\/docs\/rate-limits"},{"key":"e_1_3_2_1_25_1","volume-title":"Parma: Confidential Containers via Attested Execution Policies. arXiv:2302.03976 [cs.CR]","author":"Johnson Matthew A.","year":"2023","unstructured":"Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, and Manuel Costa. 2023. Parma: Confidential Containers via Attested Execution Policies. arXiv:2302.03976 [cs.CR]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Thomas Knauth Michael Steiner Somnath Chakrabarti Li Lei Cedric Xing and Mona Vij. 2018. Integrating Remote Attestation with Transport Layer Security. https:\/\/doi.org\/10.48550\/ARXIV.1801.05863","DOI":"10.48550\/ARXIV.1801.05863"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"Martijn Koster Gary Illyes Henner Zeller and Lizzi Sassman. 2022. Robots Exclusion Protocol. RFC 9309. https:\/\/doi.org\/10.17487\/RFC9309","DOI":"10.17487\/RFC9309"},{"key":"e_1_3_2_1_28_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 717--732. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-mengyuan"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209280.3209535"},{"key":"e_1_3_2_1_30_1","unstructured":"Dov Murik and Hubertus Franke. 2021. Securing Linux VM boot with AMD SEV measurement. https:\/\/static.sched.com\/hosted_files\/kvmforum2021\/ed\/securing-linux-vm-boot-with-amd-sev-measurement.pdf."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00116"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Vikram Narayanan Claudio Carvalho Angelo Ruocco Gheorghe Alm\u00e1si James Bottomley Mengmei Ye Tobin Feldman-Fitzthum Daniele Buono Hubertus Franke and Anton Burtsev. 2023. Remote attestation of SEV-SNP confidential VMs using e-vTPMs. arXiv:2303.16463 [cs.CR]","DOI":"10.1145\/3627106.3627112"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600171"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3615366.3615419"},{"key":"e_1_3_2_1_35_1","unstructured":"Bazel Project. 2023. Hermeticity. https:\/\/bazel.build\/basics\/hermeticity"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3092692"},{"key":"e_1_3_2_1_37_1","unstructured":"DFINITY Team. 2022. The Internet Computer for Geeks. https:\/\/internetcomputer.org\/whitepaper.pdf"},{"key":"e_1_3_2_1_38_1","unstructured":"Linux Foundation Research Team. 2022. Addressing Cybersecurity Challenges in open source Software. https:\/\/8112310.fs1.hubspotusercontentna1.net\/hubfs\/8112310\/LF%20Research\/Addressing%20Cybersecurity%20Challenges%20in%20Open%20Source%20Software%20-%20Report.pdf"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363220"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16815-4_20"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.136"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","location":"Bologna Italy","acronym":"Middleware '23","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:53:41Z","timestamp":1756486421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":41,"alternative-id":["10.1145\/3590140.3629124","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629124","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}