{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:54:02Z","timestamp":1775638442475,"version":"3.50.1"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.<\/jats:p>","DOI":"10.1145\/3624578","type":"journal-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T13:10:41Z","timestamp":1703164241000},"page":"68-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Why Should I Trust Your Code?"],"prefix":"10.1145","volume":"67","author":[{"given":"Antoine","family":"Delignat-Lavaud","sequence":"first","affiliation":[{"name":"Microsoft, Cambridge, U.K"}]},{"given":"C\u00e9dric","family":"Fournet","sequence":"additional","affiliation":[{"name":"Microsoft, Cambridge, U.K"}]},{"given":"Kapil","family":"Vaswani","sequence":"additional","affiliation":[{"name":"Microsoft, Cambridge, U.K"}]},{"given":"Sylvan","family":"Clebsch","sequence":"additional","affiliation":[{"name":"Microsoft, Austin, TX, USA"}]},{"given":"Maik","family":"Riechert","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, U.K"}]},{"given":"Manuel","family":"Costa","sequence":"additional","affiliation":[{"name":"Microsoft, Cambridge, U.K"}]},{"given":"Mark","family":"Russinovich","sequence":"additional","affiliation":[{"name":"Microsoft Azure, Bellevue, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Contour: A Practical System for Binary Transparency. Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Al-Bassam M.","year":"2018","unstructured":"Al-Bassam, M., Meiklejohn, S. Contour: A Practical System for Binary Transparency. Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 2018, 94--110; https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-00305-0_8."},{"key":"e_1_2_1_2_1","volume-title":"An Architecture for Trustworthy and Transparent Digital Supply Chains","author":"Birkholz H.","year":"2022","unstructured":"Birkholz, H., Delignat-Lavaud, A., Fournet, C., Deshpande, Y., Lasker, S. An Architecture for Trustworthy and Transparent Digital Supply Chains. IETF SCITT Working Group, 2022; https:\/\/datatracker.ietf.org\/doc\/draft-ietf-scitt-architecture\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446983.3446992"},{"key":"e_1_2_1_4_1","unstructured":"Confidential Consortium Framework. Microsoft. GitHub; https:\/\/github.com\/microsoft\/CCF."},{"key":"e_1_2_1_5_1","unstructured":"CycloneDX SBOM standard. CycloneDX 2023; https:\/\/cyclonedx.org."},{"key":"e_1_2_1_6_1","volume-title":"A deeper dive into confidential GKE nodes. Google","author":"Damlaj I.","year":"2020","unstructured":"Damlaj, I., Saboori, A. A deeper dive into confidential GKE nodes. Google, 2020; https:\/\/cloud.google.com\/blog\/products\/identity-security\/confidential-gke-nodes-now-available."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564089"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560835.3564549"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659897"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 24th Usenix Security Symp. 2015; https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-melara.pdf.","author":"Melara M.S.","unstructured":"Melara, M.S., Blankstein, A., Bonneau, J., Felten, E.W., Freedman, M.J. CONIKS: bringing key transparency to end users. In Proceedings of the 24th Usenix Security Symp. 2015; https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-melara.pdf."},{"key":"e_1_2_1_11_1","volume-title":"Confidential containers on Azure container instances (ACI)","author":"Microsoft","year":"2023","unstructured":"Microsoft. Confidential containers on Azure container instances (ACI), 2023; https:\/\/learn.microsoft.com\/en-us\/azure\/container-instances\/container-instances-confidential-overview."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 26th Usenix Security Symp.","author":"Nikitin K.","unstructured":"Nikitin, K. et al. CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified build. In Proceedings of the 26th Usenix Security Symp., 2017; https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/nikitin."},{"key":"e_1_2_1_14_1","unstructured":"Open Enclave SDK. GitHub; https:\/\/github.com\/openenclave\/openenclave."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453930"},{"key":"e_1_2_1_16_1","unstructured":"SCITT service prototype based on CCF. Microsoft. GitHub 2023; https:\/\/github.com\/microsoft\/scitt-ccf-ledger."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5033\/ifosslr.v4i1.45"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 28th Usenix Security Symp. 2019; https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/torres-arias.","author":"Torres-Arias S.","year":"2019","unstructured":"Torres-Arias, S., Afzali, H., Kuppusamy, T. K., Curtmola, R., Cappos, J. 2019. in-toto: providing farm-to-table guarantees for bits and bytes. In Proceedings of the 28th Usenix Security Symp. 2019; https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/torres-arias."},{"key":"e_1_2_1_20_1","unstructured":"Transparent code updates for confidential computing. Draft Technical Report. https:\/\/www.microsoft.com\/research\/group\/azure-research\/."},{"key":"e_1_2_1_21_1","unstructured":"Triton inference server. GitHub; https:\/\/github.com\/triton-inference-server."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3624578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:03:47Z","timestamp":1755972227000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1145\/3624578"],"URL":"https:\/\/doi.org\/10.1145\/3624578","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"2023-12-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}