{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:35:05Z","timestamp":1772724905176,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3622781.3674169","type":"proceedings-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T15:31:01Z","timestamp":1744299061000},"page":"252-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Salus: A Practical Trusted Execution Environment for CPU-FPGA Heterogeneous Cloud Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4541-6638","authenticated-orcid":false,"given":"Yu","family":"Zou","sequence":"first","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2378-6284","authenticated-orcid":false,"given":"Yiran","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1582-3316","authenticated-orcid":false,"given":"Sheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9631-152X","authenticated-orcid":false,"given":"Le","family":"Su","sequence":"additional","affiliation":[{"name":"Alibaba Group, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7067-492X","authenticated-orcid":false,"given":"Zhen","family":"Gu","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group, Beijing, China"},{"name":"Hupan Lab, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4024-6125","authenticated-orcid":false,"given":"Yanheng","family":"Lu","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group, Shanghai, China"},{"name":"Hupan Lab, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8854-2132","authenticated-orcid":false,"given":"Yijin","family":"Guan","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group, Beijing, China"},{"name":"Hupan Lab, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8440-3875","authenticated-orcid":false,"given":"Dimin","family":"Niu","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group, Sunnyvale, United States"},{"name":"Hupan Lab, Sunnyvale, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8433-7281","authenticated-orcid":false,"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"},{"name":"Shanghai AI Laboratory, Beijing, China"},{"name":"Shanghai Qi Zhi Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2093-1788","authenticated-orcid":false,"given":"Yuan","family":"Xie","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group, Hangzhou, China"},{"name":"Hupan Lab, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0770-5775","authenticated-orcid":false,"given":"Feifei","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/aws.amazon.com\/ec2\/instance-types\/f1\/","author":"Amazon","year":"2024","unstructured":"Amazon ec2 f1 instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/f1\/, 2024."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/docs.xilinx.com\/r\/en-US\/ug909-vivado-partial-reconfiguration","author":"Amd","year":"2024","unstructured":"Amd adaptive computing documentation portal. https:\/\/docs.xilinx.com\/r\/en-US\/ug909-vivado-partial-reconfiguration, 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/docs.amd.com\/v\/u\/QIPlm0yVRKL~grcqwY2VWQ","author":"Amd","year":"2024","unstructured":"Amd partial reconfiguration. https:\/\/docs.amd.com\/v\/u\/QIPlm0yVRKL~grcqwY2VWQ, 2024."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/software-guard-extensions\/attestation-services.html","author":"Attestation","year":"2024","unstructured":"Attestation services for intel\u00ae software guard extensions. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/software-guard-extensions\/attestation-services.html, 2024."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/","author":"Azure","year":"2024","unstructured":"Azure confidential computing | microsoft learn. https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/, 2024."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/blog.cloud66.com\/part-2-comparing-the-speed-of-vm-creation-and-ssh-access-on-aws-digitalocean-linode-vexxhost-google-cloud-rackspace-packet-cloud-a-and-microsoft-azure","author":"Comparing","year":"2024","unstructured":"Comparing the speed of vm creation and ssh access of cloud providers. https:\/\/blog.cloud66.com\/part-2-comparing-the-speed-of-vm-creation-and-ssh-access-on-aws-digitalocean-linode-vexxhost-google-cloud-rackspace-packet-cloud-a-and-microsoft-azure, 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.alibabacloud.com\/help\/en\/ecs\/user-guide\/confidential-computing-capabilities\/","author":"Confidential","year":"2024","unstructured":"Confidential computing capabilities. https:\/\/www.alibabacloud.com\/help\/en\/ecs\/user-guide\/confidential-computing-capabilities\/, 2024."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/azure\/machine-learning\/v1\/how-to-deploy-fpga-web-service?view=azureml-api-1#fpga-support-in-azure","author":"Deploy","year":"2024","unstructured":"Deploy ml models to fpgas - azure machine learning | microsoft learn. https:\/\/learn.microsoft.com\/en-us\/azure\/machine-learning\/v1\/how-to-deploy-fpga-web-service?view=azureml-api-1#fpga-support-in-azure, 2024."},{"key":"e_1_3_2_1_9_1","volume-title":"Embedded software development (ug1400) \u2022 reader \u2022 amd adaptive computing documentation portal. https:\/\/docs.xilinx.com\/r\/en-US\/ug1400-vitis-embedded\/familykey","year":"2024","unstructured":"familykey \u2022 vitis unified software platform documentation: Embedded software development (ug1400) \u2022 reader \u2022 amd adaptive computing documentation portal. https:\/\/docs.xilinx.com\/r\/en-US\/ug1400-vitis-embedded\/familykey, 2024."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/www.alibabacloud.com\/help\/en\/fpga-based-ecs-instance","author":"Fpga","year":"2024","unstructured":"Fpga as a service. https:\/\/www.alibabacloud.com\/help\/en\/fpga-based-ecs-instance, 2024."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/grpc.io\/","year":"2024","unstructured":"grpc. https:\/\/grpc.io\/, 2024."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/docs.xilinx.com\/r\/en-US\/ug974-vivado-ultrascale-libraries","author":"Introduction","year":"2024","unstructured":"Introduction \u2022 ultrascale architecture libraries guide (ug974) \u2022 reader \u2022 documentation portal. https:\/\/docs.xilinx.com\/r\/en-US\/ug974-vivado-ultrascale-libraries, 2024."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.rapidwright.io\/docs\/index.html","author":"Rapidwright","year":"2024","unstructured":"Rapidwright documentation --- rapidwright 2022.2.0-beta documentation. https:\/\/www.rapidwright.io\/docs\/index.html, 2024."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/github.com\/Xilinx\/SDAccel_Examples\/tree\/master\/getting_started\/clk_freq\/large_loop_ocl","year":"2024","unstructured":"Sdaccel_examples\/getting_started\/clk_freq\/large_loop_ocl at master \u00b7 xilinx\/sdaccel_examples. https:\/\/github.com\/Xilinx\/SDAccel_Examples\/tree\/master\/getting_started\/clk_freq\/large_loop_ocl, 2024."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/pcisig.com\/tee-device-interface-security-protocol-tdisp","author":"Tee","year":"2024","unstructured":"Tee device interface security protocol (tdisp) | pci-sig. https:\/\/pcisig.com\/tee-device-interface-security-protocol-tdisp, 2024."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/medium.com\/google-cloud\/understanding-and-profiling-gce-cold-boot-time-32c209fe86ab","author":"Understanding","year":"2024","unstructured":"Understanding and profiling gce cold-boot time | by colt mcanlis | google cloud - community | medium. https:\/\/medium.com\/google-cloud\/understanding-and-profiling-gce-cold-boot-time-32c209fe86ab, 2024."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.xilinx.com\/content\/dam\/xilinx\/support\/documents\/application_notes\/xapp1267-encryp-efuse-program.pdf","author":"Using","year":"2024","unstructured":"Using encryption and authentication to secure an ultrascale\/ultrascale+ fpga bitstream application note. https:\/\/www.xilinx.com\/content\/dam\/xilinx\/support\/documents\/application_notes\/xapp1267-encryp-efuse-program.pdf, 2024."},{"key":"e_1_3_2_1_18_1","volume-title":"Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography. Technical report","author":"Barker Elaine","year":"2017","unstructured":"Elaine Barker, Lily Chen, Sharon Keller, Allen Roginsky, Apostol Vassilev, and Richard Davis. Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography. Technical report, National Institute of Standards and Technology, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Intel sgx explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. Intel sgx explained. Cryptology ePrint Archive, 2016."},{"key":"e_1_3_2_1_20_1","first-page":"349","volume-title":"Proceedings of the 59th ACM\/IEEE Design Automation Conference","author":"Hua Weizhe","year":"2022","unstructured":"Weizhe Hua, Muhammad Umar, Zhiru Zhang, and G Edward Suh. Guardnn: Secure accelerator architecture for privacy-preserving deep learning. In Proceedings of the 59th ACM\/IEEE Design Automation Conference, pages 349--354, 2022."},{"key":"e_1_3_2_1_21_1","first-page":"817","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hunt Tyler","year":"2020","unstructured":"Tyler Hunt, Zhipeng Jia, Vance Miller, Ariel Szekely, Yige Hu, Christopher J Rossbach, and Emmett Witchel. Telekine: Secure computing with cloud {GPUs}. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 817--833, 2020."},{"key":"e_1_3_2_1_22_1","article-title":"A runtime framework to delegate trusted applications in an arm\/fpga hybrid system","author":"Hwang Dongil","year":"2021","unstructured":"Dongil Hwang, Sanzhar Yeleuov, Jiwon Seo, Minu Chung, Hyungon Moon, and Yunheung Paek. Ambassy: A runtime framework to delegate trusted applications in an arm\/fpga hybrid system. IEEE Transactions on Mobile Computing, 2021.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/MICRO56248.2022.00019","volume-title":"2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO)","author":"Jiang Jianyu","year":"2022","unstructured":"Jianyu Jiang, Ji Qi, Tianxiang Shen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Gong Zhang, Xiapu Luo, and Heming Cui. Cronus: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment. In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO), pages 124--143. IEEE, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Baudoin","author":"Kerckhoffs Auguste","year":"1883","unstructured":"Auguste Kerckhoffs. La cryptographie militaire, ou, Des chiffres usit\u00e9s en temps de guerre: avec un nouveau proc\u00e9d\u00e9 de d\u00e9chiffrement applicable aux syst\u00e8mes \u00e0 double clef. Librairie militaire de L. Baudoin, 1883."},{"key":"e_1_3_2_1_26_1","article-title":"Hardware-assisted static and runtime attestation for cloud deployments","author":"Kucab Micha\u0142","year":"2023","unstructured":"Micha\u0142 Kucab, Piotr Bory\u0142o, and Piotr Cho\u0142da. Hardware-assisted static and runtime attestation for cloud deployments. IEEE Transactions on Cloud Computing, 2023.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/FCCM.2018.00030","volume-title":"2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)","author":"Lavin Chris","year":"2018","unstructured":"Chris Lavin and Alireza Kaviani. Rapidwright: Enabling custom crafted implementations for fpgas. In 2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pages 133--140. IEEE, 2018."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"2022 International Conference on Field-Programmable Technology (ICFPT)","author":"Manev Kristiyan","year":"2022","unstructured":"Kristiyan Manev, Joseph Powell, Kaspar Matas, and Dirk Koch. byte-man: A bitstream manipulation framework. In 2022 International Conference on Field-Programmable Technology (ICFPT), pages 1--9. IEEE, 2022."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/CLOUD60044.2023.00073","volume-title":"2023 IEEE 16th International Conference on Cloud Computing (CLOUD)","author":"Morbitzer Mathias","year":"2023","unstructured":"Mathias Morbitzer, Benedikt Kopf, and Philipp Zieris. Guarantee: Introducing control-flow attestation for trusted execution environments. In 2023 IEEE 16th International Conference on Cloud Computing (CLOUD), pages 547--553. IEEE, 2023."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069223"},{"key":"e_1_3_2_1_32_1","first-page":"227","volume-title":"2018 Usenix Annual Technical Conference (USENIX ATC 18)","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. Varys: Protecting {SGX} enclaves from practical {Side-Channel} attacks. In 2018 Usenix Annual Technical Conference (USENIX ATC 18), pages 227--240, 2018."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3595179"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133074"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405897"},{"key":"e_1_3_2_1_37_1","volume-title":"25th ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays","author":"Srivastava Nitish","year":"2017","unstructured":"Nitish Srivastava, Steve Dai, Rajit Manohar, and Zhiru Zhang. Accelerating face detection on programmable soc using c-based synthesis. In 25th ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays, Feb 2017."},{"key":"e_1_3_2_1_38_1","first-page":"121","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Toffalini Flavio","year":"2019","unstructured":"Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, and Mauro Conti. {ScaRR}: Scalable runtime remote attestation for complex systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), pages 121--134, 2019."},{"key":"e_1_3_2_1_39_1","first-page":"681","volume-title":"OSDI","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. Graviton: Trusted execution environments on gpus. In OSDI, pages 681--696, 2018."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/DAC18074.2021.9586207","volume-title":"2021 58th ACM\/IEEE Design Automation Conference (DAC)","author":"Xia Ke","year":"2021","unstructured":"Ke Xia, Yukui Luo, Xiaolin Xu, and Sheng Wei. Sgx-fpga: Trusted execution environment for cpu-fpga heterogeneous architecture. In 2021 58th ACM\/IEEE Design Automation Conference (DAC), pages 301--306. IEEE, 2021."},{"key":"e_1_3_2_1_41_1","first-page":"1","volume-title":"Proceedings of the 36th ACM International Conference on Super-computing","author":"Baskara Yudha Ardhi Wiratama","year":"2022","unstructured":"Ardhi Wiratama Baskara Yudha, Jake Meyer, Shougang Yuan, Huiyang Zhou, and Yan Solihin. Lite: A low-cost practical inter-operable gpu tee. In Proceedings of the 36th ACM International Conference on Super-computing, pages 1--13, 2022."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1145\/3503222.3507733","volume-title":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Zhao Mark","year":"2022","unstructured":"Mark Zhao, Mingyu Gao, and Christos Kozyrakis. Shef: Shielded enclaves for cloud fpgas. In Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, pages 1070--1085, 2022."},{"key":"e_1_3_2_1_43_1","volume-title":"Wenping Wang, and Zhiru Zhang. Rosetta: A Realistic High-Level Synthesis Benchmark Suite for Software-Programmable FPGAs. Int'l Symp. on Field-Programmable Gate Arrays (FPGA)","author":"Zhou Yuan","year":"2018","unstructured":"Yuan Zhou, Udit Gupta, Steve Dai, Ritchie Zhao, Nitish Srivastava, Hanchen Jin, Joseph Featherston, Yi-Hsiang Lai, Gai Liu, Gustavo Angarita Velasquez, Wenping Wang, and Zhiru Zhang. Rosetta: A Realistic High-Level Synthesis Benchmark Suite for Software-Programmable FPGAs. Int'l Symp. on Field-Programmable Gate Arrays (FPGA), Feb 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/HOST49136.2021.9702283","volume-title":"2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","author":"Zou Yu","year":"2021","unstructured":"Yu Zou, Amro Awad, and Mingjie Lin. Hermes: Hardware-efficient speculative dataflow architecture for bonsai merkle tree-based memory authentication. In 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 203--213. IEEE, 2021."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1109\/ISVLSI.2019.00066","volume-title":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","author":"Zou Yu","year":"2019","unstructured":"Yu Zou and Mingjie Lin. Fast: A frequency-aware skewed merkle tree for fpga-secured embedded systems. In 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 326--331. IEEE, 2019."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4","location":"Hilton La Jolla Torrey Pines La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3622781.3674169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3622781.3674169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:03Z","timestamp":1750178223000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3622781.3674169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":46,"alternative-id":["10.1145\/3622781.3674169","10.1145\/3622781"],"URL":"https:\/\/doi.org\/10.1145\/3622781.3674169","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2025-04-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}