{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:08Z","timestamp":1766449808892,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"ERC","award":["802823"],"award-info":[{"award-number":["802823"]}]},{"name":"SNF","award":["AMBIZIONE"],"award-info":[{"award-number":["AMBIZIONE"]}]},{"name":"DFG","award":["JA2445\/6-1"],"award-info":[{"award-number":["JA2445\/6-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690358","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2445-2459","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Password-Protected Key Retrieval with(out) HSM Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4126-3098","authenticated-orcid":false,"given":"Sebastian","family":"Faller","sequence":"first","affiliation":[{"name":"IBM Research Europe &amp; ETH Zurich, Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5368-877X","authenticated-orcid":false,"given":"Tobias","family":"Handirk","sequence":"additional","affiliation":[{"name":"Bergische Universit\u00e4t Wuppertal, Wuppertal, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2875-6198","authenticated-orcid":false,"given":"Julia","family":"Hesse","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9512-5196","authenticated-orcid":false,"given":"M\u00e1t\u00e9","family":"Horv\u00e1th","sequence":"additional","affiliation":[{"name":"Bergische Universit\u00e4t Wuppertal, Wuppertal, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2872-7899","authenticated-orcid":false,"given":"Anja","family":"Lehmann","sequence":"additional","affiliation":[{"name":"Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243774"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046758"},{"key":"e_1_3_2_1_3_1","first-page":"04","article-title":"Everybody be Cool, This is a Robbery! BlackHat USA 2019. http:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf","volume":"24","author":"Bedrune Jean-Baptiste","year":"2019","unstructured":"Jean-Baptiste Bedrune and Gabriel Campana. 2019. Everybody be Cool, This is a Robbery! BlackHat USA 2019. http:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf, Accessed: 24.04.2024.","journal-title":"Accessed"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168618"},{"key":"e_1_3_2_1_5_1","unstructured":"Dan Boneh and Victor Shoup. 2023. A Graduate Course in Applied Cryptography. http:\/\/toc.cryptobook.us\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--45539--6_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--44381--1_15"},{"key":"e_1_3_2_1_8_1","unstructured":"Ran Canetti. 2000. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive Report 2000\/067. https:\/\/eprint.iacr.org\/2000\/067."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485256"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517389"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--38551--3_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sebastian Faller Tobias Handirk Julia Hesse M\u00e1t\u00e9 Horv\u00e1th and Anja Lehmann. 2024. Password-Protected Key Retrieval with(out) HSM Protection. Cryptology ePrint Archive Paper 2024\/1384. https:\/\/eprint.iacr.org\/2024\/1384","DOI":"10.1145\/3658644.3690358"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.30"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--78372--7_15"},{"key":"e_1_3_2_1_17_1","first-page":"04","article-title":"Behind the scenes with iOS security. https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Krstic.pdf","volume":"18","author":"Krstic Ivan","year":"2016","unstructured":"Ivan Krstic. 2016. Behind the scenes with iOS security. https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Krstic.pdf, Accessed: 18.04.2024.","journal-title":"Accessed"},{"key":"e_1_3_2_1_18_1","first-page":"04","article-title":"Technology preview for secure value recovery. https:\/\/signal.org\/blog\/secure-value-recovery\/","volume":"18","author":"Lund Joshua","year":"2019","unstructured":"Joshua Lund. 2019. Technology preview for secure value recovery. https:\/\/signal.org\/blog\/secure-value-recovery\/, Accessed: 18.04.2024.","journal-title":"Accessed"},{"key":"e_1_3_2_1_19_1","unstructured":"Chris Orsini Alessandra Scafuro and Tanner Verber. 2023. How to Recover a Cryptographic Secret From the Cloud. Cryptology ePrint Archive Paper 2023\/1308. https:\/\/eprint.iacr.org\/2023\/1308 https:\/\/eprint.iacr.org\/2023\/1308."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--56620--7_10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--17259--6_2"},{"key":"e_1_3_2_1_22_1","volume-title":"Trust Dies in Darkness: Shedding Light on Samsungtextquoterights TrustZone Keymaster Design. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Shakevsky Alon","year":"2022","unstructured":"Alon Shakevsky, Eyal Ronen, and Avishai Wool. 2022. Trust Dies in Darkness: Shedding Light on Samsungtextquoterights TrustZone Keymaster Design. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 251--268. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/shakevsky"},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel SGX kingdom with transient Out-of-Order execution. In 27th USENIX Security Symposium (USENIX Security 18). 991--1008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_25_1","first-page":"04","article-title":"Google Cloud Key Vault Service. https:\/\/developer.android.com\/about\/versions\/pie\/security\/ckv-whitepaper","volume":"18","author":"Walfish Shabsi","year":"2018","unstructured":"Shabsi Walfish. 2018. Google Cloud Key Vault Service. https:\/\/developer.android.com\/about\/versions\/pie\/security\/ckv-whitepaper, Accessed: 18.04.2024.","journal-title":"Accessed"},{"key":"e_1_3_2_1_26_1","unstructured":"Xunhua Wang and Ben Huson. 2020. Robust distributed symmetric-key encryption. Cryptology ePrint Archive Report 2020\/1001. https:\/\/eprint.iacr.org\/2020\/1001."},{"key":"e_1_3_2_1_27_1","first-page":"04","article-title":"Security of End-to-End Encrypted Backups. https:\/\/www.whatsapp.com\/security\/WhatsApp_Security_Encrypted_Backups_Whitepaper.pdf","volume":"18","year":"2021","unstructured":"WhatsApp. 2021. Security of End-to-End Encrypted Backups. https:\/\/www.whatsapp.com\/security\/WhatsApp_Security_Encrypted_Backups_Whitepaper.pdf, Accessed: 18.04.2024.","journal-title":"Accessed"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:07:18Z","timestamp":1755842838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":27,"alternative-id":["10.1145\/3658644.3690358","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690358","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}