{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:42:37Z","timestamp":1771980157895,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594626","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"85-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6705-6506","authenticated-orcid":false,"given":"Rabimba","family":"Karanjai","sequence":"first","affiliation":[{"name":"University Of Houston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4327-2238","authenticated-orcid":false,"given":"Rowan","family":"Collier","sequence":"additional","affiliation":[{"name":"Kent State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0785-0609","authenticated-orcid":false,"given":"Zhimin","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Houston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3909-4916","authenticated-orcid":false,"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Texas Tech University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-6603","authenticated-orcid":false,"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[{"name":"IoTex, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6377-5482","authenticated-orcid":false,"given":"Taeweon","family":"Suh","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1994-4218","authenticated-orcid":false,"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Houston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7662-2119","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"Kent State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"e_1_3_2_1_2_1","unstructured":"AMD. 2023. AMD Secure Encrypted Virtualization (SEV) | AMD. (2023). https:\/\/www.amd.com\/en\/developer\/sev.html  AMD. 2023. AMD Secure Encrypted Virtualization (SEV) | AMD. (2023). https:\/\/www.amd.com\/en\/developer\/sev.html"},{"key":"e_1_3_2_1_3_1","unstructured":"ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. (2009).  ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. (2009)."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM Research. 2021. Veracruz. https:\/\/github.com\/veracruz-project\/veracruz. (2021).  ARM Research. 2021. Veracruz. https:\/\/github.com\/veracruz-project\/veracruz. (2021)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW53611.2021.00100"},{"key":"e_1_3_2_1_7_1","volume-title":"Whitepaper: AMD memory encryption. (April","author":"David\u00a0Kaplan Jeremy\u00a0Powell","year":"2016","unstructured":"Jeremy\u00a0Powell David\u00a0Kaplan and Tom Woller . 2016 . Whitepaper: AMD memory encryption. (April 2016). Jeremy\u00a0Powell David\u00a0Kaplan and Tom Woller. 2016. Whitepaper: AMD memory encryption. (April 2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"Nvidia Hopper GPU and Grace CPU Highlights. Authorea Preprints","author":"Elster C","year":"2022","unstructured":"Anne\u00a0 C Elster and Tor\u00a0 A Haugdahl . 2022. Nvidia Hopper GPU and Grace CPU Highlights. Authorea Preprints ( 2022 ). Anne\u00a0C Elster and Tor\u00a0A Haugdahl. 2022. Nvidia Hopper GPU and Grace CPU Highlights. Authorea Preprints (2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102344"},{"key":"e_1_3_2_1_10_1","unstructured":"Intel. 2014. Intel Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf  Intel. 2014. Intel Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Data Leakage Prevention System for Smart Grid","author":"Jiang Chengzhi","unstructured":"Chengzhi Jiang and Song Deng . 2020. Data Leakage Prevention System for Smart Grid . In Big Data and Security, Yuan Tian, Tinghuai Ma, and Muhammad\u00a0Khurram Khan (Eds.). Springer Singapore , Singapore , 541\u2013549. Chengzhi Jiang and Song Deng. 2020. Data Leakage Prevention System for Smart Grid. In Big Data and Security, Yuan Tian, Tinghuai Ma, and Muhammad\u00a0Khurram Khan (Eds.). Springer Singapore, Singapore, 541\u2013549."},{"key":"e_1_3_2_1_12_1","volume-title":"Trusted Monitor: TEE-Based System Monitoring. In 2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 1\u20138.","author":"Jung Benedikt","year":"2022","unstructured":"Benedikt Jung , Christian Eichler , Jonas R\u00f6ckl , Ralph Schlenk , Timo H\u00f6nig , and Tilo M\u00fcller . 2022 . Trusted Monitor: TEE-Based System Monitoring. In 2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 1\u20138. Benedikt Jung, Christian Eichler, Jonas R\u00f6ckl, Ralph Schlenk, Timo H\u00f6nig, and Tilo M\u00fcller. 2022. Trusted Monitor: TEE-Based System Monitoring. In 2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 1\u20138."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MC.2021.3055892","article-title":"Artificial intelligence in critical infrastructure systems","volume":"54","author":"Laplante Phil","year":"2021","unstructured":"Phil Laplante and Ben Amaba . 2021 . Artificial intelligence in critical infrastructure systems . Computer 54 , 10 (2021), 14 \u2013 24 . Phil Laplante and Ben Amaba. 2021. Artificial intelligence in critical infrastructure systems. Computer 54, 10 (2021), 14\u201324.","journal-title":"Computer"},{"key":"e_1_3_2_1_14_1","volume-title":"A Survey on RISC-V Security: Hardware and Architecture. arXiv preprint arXiv:2107.04175","author":"Tao Lu.","year":"2021","unstructured":"Tao Lu. 2021. A Survey on RISC-V Security: Hardware and Architecture. arXiv preprint arXiv:2107.04175 ( 2021 ). Tao Lu. 2021. A Survey on RISC-V Security: Hardware and Architecture. arXiv preprint arXiv:2107.04175 (2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903242"},{"key":"e_1_3_2_1_17_1","volume-title":"Workshop on Hardware and Architectural Support for Security and Privacy(HASP \u201921)","author":"Rabimba Karanjai","year":"2022","unstructured":"Karanjai Rabimba , Lei Xu , Lin Chen , Fengwei Zhang , Zhimin Gao , and Weidong Shi . 2022 . Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research . In Workshop on Hardware and Architectural Support for Security and Privacy(HASP \u201921) . Association for Computing Machinery, New York, NY, USA, Article 5, 8\u00a0pages. https:\/\/doi.org\/10.1145\/3505253.3505259 10.1145\/3505253.3505259 Karanjai Rabimba, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao, and Weidong Shi. 2022. Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. In Workshop on Hardware and Architectural Support for Security and Privacy(HASP \u201921). Association for Computing Machinery, New York, NY, USA, Article 5, 8\u00a0pages. https:\/\/doi.org\/10.1145\/3505253.3505259"},{"key":"e_1_3_2_1_18_1","volume-title":"Correctness analysis of IBFT. arXiv preprint arXiv:1901.07160","author":"Saltini Roberto","year":"2019","unstructured":"Roberto Saltini and David Hyland-Wood . 2019. Correctness analysis of IBFT. arXiv preprint arXiv:1901.07160 ( 2019 ). Roberto Saltini and David Hyland-Wood. 2019. Correctness analysis of IBFT. arXiv preprint arXiv:1901.07160 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461085"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63406-3_16"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00099"},{"key":"e_1_3_2_1_22_1","volume-title":"Supporting third party attestation for Intel SGX with Intel data center attestation primitives. White paper","author":"Scarlata Vinnie","year":"2018","unstructured":"Vinnie Scarlata , Simon Johnson , James Beaney , and Piotr Zmijewski . 2018. Supporting third party attestation for Intel SGX with Intel data center attestation primitives. White paper ( 2018 ). Vinnie Scarlata, Simon Johnson, James Beaney, and Piotr Zmijewski. 2018. Supporting third party attestation for Intel SGX with Intel data center attestation primitives. White paper (2018)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2909768"},{"key":"e_1_3_2_1_24_1","volume-title":"EIP 225: Clique proof-of-authority consensus protocol. Ethereum Improvement Proposals","author":"Szil\u00e1gyi P\u00e9ter","year":"2017","unstructured":"P\u00e9ter Szil\u00e1gyi . 2017. EIP 225: Clique proof-of-authority consensus protocol. Ethereum Improvement Proposals ( 2017 ). P\u00e9ter Szil\u00e1gyi. 2017. EIP 225: Clique proof-of-authority consensus protocol. Ethereum Improvement Proposals (2017)."},{"key":"e_1_3_2_1_25_1","volume-title":"Impact of cyber-attacks on critical infrastructure. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity)","author":"Thakur Kutub","unstructured":"Kutub Thakur , Md\u00a0Liakat Ali , Ning Jiang , and Meikang Qiu . 2016. Impact of cyber-attacks on critical infrastructure. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) , IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE , 183\u2013186. Kutub Thakur, Md\u00a0Liakat Ali, Ning Jiang, and Meikang Qiu. 2016. Impact of cyber-attacks on critical infrastructure. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, 183\u2013186."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031889"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586207"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00118"},{"key":"e_1_3_2_1_29_1","first-page":"27","article-title":"Reshaping the Landscape of the Future","volume":"54","author":"Xu Lei","year":"2021","unstructured":"Lei Xu , Lin Chen , Zhimin Gao , Hiram Moya , and Weidong Shi . 2021 . Reshaping the Landscape of the Future : Software-Defined Manufacturing. Computer 54 , 7 (2021), 27 \u2013 36 . Lei Xu, Lin Chen, Zhimin Gao, Hiram Moya, and Weidong Shi. 2021. Reshaping the Landscape of the Future: Software-Defined Manufacturing. Computer 54, 7 (2021), 27\u201336.","journal-title":"Software-Defined Manufacturing. Computer"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386127"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1839-y"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":31,"alternative-id":["10.1145\/3594556.3594626","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594626","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}