{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:56:25Z","timestamp":1762869385169,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,7]]},"DOI":"10.1145\/3637543.3654655","type":"proceedings-article","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T06:19:21Z","timestamp":1719814761000},"page":"10-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["HAGAR: Hashgraph-based Aggregated Communication and Remote Attestation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4258-2208","authenticated-orcid":false,"given":"Jo","family":"Vliegen","sequence":"first","affiliation":[{"name":"ES&amp;S, COSIC, ESAT, KU Leuven"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3518-0203","authenticated-orcid":false,"given":"Md Masoom","family":"Rabbani","sequence":"additional","affiliation":[{"name":"ES&amp;S, COSIC, ESAT, KU Leuven"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2344-044X","authenticated-orcid":false,"given":"Wouter","family":"Hellemans","sequence":"additional","affiliation":[{"name":"ES&amp;S, COSIC, ESAT, KU Leuven"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-7895","authenticated-orcid":false,"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[{"name":"ES&amp;S, COSIC, ESAT, KU Leuven and LIACS, Leiden University, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. The 5 Big Problems With Blockchain Everyone Should Be Aware Of. https:\/\/www.bernardmarr.com\/default.asp?contentID=1354."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. The Daily Swig. https:\/\/portswigger.net\/daily-swig\/ransomware."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2018.00009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3008879"},{"key":"e_1_3_2_1_7_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis et al. 2017. Understanding the mirai botnet. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1093--1110."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_9_1","first-page":"9","article-title":"The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01","volume":"34","author":"Baird Leemon","year":"2016","unstructured":"Leemon Baird. 2016. The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01, Tech. Rep 34 (2016), 9--11.","journal-title":"Tech. Rep"},{"key":"e_1_3_2_1_10_1","volume-title":"Hedera: A Public Hashgraph Network & Governing Council. https:\/\/hedera.com\/hh_whitepaper_v2.1-20200815.pdf. 2017","author":"Baird Leemon","year":"2017","unstructured":"Leemon Baird, Mance Harmon, and Paul Madsen. 2017. Hedera: A Public Hashgraph Network & Governing Council. https:\/\/hedera.com\/hh_whitepaper_v2.1-20200815.pdf. 2017 (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053010"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983282"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3106026"},{"key":"e_1_3_2_1_15_1","first-page":"713","article-title":"Systematic Treatment of Remote Attestation","volume":"2012","author":"Francillon Aurelien","year":"2012","unstructured":"Aurelien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, and Gene Tsudik. 2012. Systematic Treatment of Remote Attestation. IACR Cryptology ePrint Archive 2012 (2012), 713.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the conference on Design, Automation & Test in Europe (DATE '14)","author":"Francillon Aur\u00e9lien","year":"2014","unstructured":"Aur\u00e9lien Francillon, Quan Nguyen, Kasper B Rasmussen, and Gene Tsudik. 2014. A Minimalist Approach to Remote Attestation. In Proceedings of the conference on Design, Automation & Test in Europe (DATE '14). 244."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939938"},{"key":"e_1_3_2_1_18_1","volume-title":"SeED: Secure Non-Interactive Attestation for Embedded Devices. In WiSec '17","author":"Ibrahim Ahmad","year":"2017","unstructured":"Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Shaza Zeitouni. 2017. SeED: Secure Non-Interactive Attestation for Embedded Devices. In WiSec '17."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196544"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196544"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468284"},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf Accessed: 2015-07-01.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf Accessed: 2015-07-01."},{"key":"e_1_3_2_1_23_1","volume-title":"Iota whitepaper. Technical White Paper, year 2017","author":"Popov Sergei","year":"2017","unstructured":"Sergei Popov. 2017. Iota whitepaper. Technical White Paper, year 2017 (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"M. M. Rabbani J. Vliegen J. Winderickx M. Conti and N. Mentens. 2019. SHeLA: Scalable Heterogeneous Layered Attestation. IEEE Internet of Things Journal (2019) 10240--10250.","DOI":"10.1109\/JIOT.2019.2936988"},{"key":"e_1_3_2_1_25_1","unstructured":"Rob Waugh. 2016. Smart TV hackers are filming people having sex on their sofas and putting it on porn sites. http:\/\/metro.co.uk\/2016\/05\/23\/smart-tv-hackers-are-filming-people-having-sex-on-their-sofas-and-putting-it-on-porn-sites-5899248."}],"event":{"name":"CF '24: 21st ACM International Conference on Computing Frontiers","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF '24"},"container-title":["Proceedings of the 21st ACM International Conference on Computing Frontiers: Workshops and Special Sessions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3654655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637543.3654655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:46:56Z","timestamp":1755913616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3654655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":25,"alternative-id":["10.1145\/3637543.3654655","10.1145\/3637543"],"URL":"https:\/\/doi.org\/10.1145\/3637543.3654655","relation":{},"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}