{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:46Z","timestamp":1750309186146,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,9]]},"DOI":"10.1145\/3678232.3678244","type":"proceedings-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:35:17Z","timestamp":1725489317000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evidence Tampering and Chain of Custody in Layered Attestations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9988-4024","authenticated-orcid":false,"given":"Ian","family":"Kretz","sequence":"first","affiliation":[{"name":"No research affiliation, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1942-640X","authenticated-orcid":false,"given":"Paul","family":"Rowe","sequence":"additional","affiliation":[{"name":"Two Six Technologies, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1289-8951","authenticated-orcid":false,"given":"Clare","family":"Parran","sequence":"additional","affiliation":[{"name":"The MITRE Corporation, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5547-0427","authenticated-orcid":false,"given":"John","family":"Ramsdell","sequence":"additional","affiliation":[{"name":"The MITRE Corporation, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] [n. d.]. https:\/\/github.com\/mitre\/copland\/tree\/main\/src\/tampering."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. The Coq proof assistant reference manual. https:\/\/coq.inria.fr\/doc\/V8.17.1\/refman\/ Version 8.17.1 https:\/\/coq.inria.fr."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"H. Birkholz D. Thaler M. Richardson N. Smith and W. Pan. 2023. RFC 9334: Remote Attestation Procedures Architecture. https:\/\/datatracker.ietf.org\/doc\/rfc9334\/.","DOI":"10.17487\/RFC9334"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.16"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Anna Fritz and Perry Alexander. 2023. A Framework for Policy Based Negotiation. In NASA Formal Methods Kristin\u00a0Yvonne Rozier and Swarat Chaudhuri (Eds.). Springer Nature Switzerland Cham 207\u2013223.","DOI":"10.1007\/978-3-031-33170-1_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470535"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102952"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23084074"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599735"},{"key":"e_1_3_2_1_12_1","volume-title":"Maat: A Platform Service for Measurement and Attestation. CoRR abs\/1709.10147","author":"Pendergrass Aaron","year":"2017","unstructured":"J.\u00a0Aaron Pendergrass, Sarah Helble, John Clemens, and Peter\u00a0A. Loscocco. 2017. Maat: A Platform Service for Measurement and Attestation. CoRR abs\/1709.10147 (2017). arXiv:1709.10147http:\/\/arxiv.org\/abs\/1709.10147"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3314060"},{"volume-title":"An Infrastructure for Faithful Execution of Remote Attestation Protocols","author":"Petz Adam","key":"e_1_3_2_1_14_1","unstructured":"Adam Petz and Perry Alexander. 2021. An Infrastructure for Faithful Execution of Remote Attestation Protocols. In NASA Formal Methods, Aaron Dutle, Mariano\u00a0M. Moscato, Laura Titolo, C\u00e9sar\u00a0A. Mu\u00f1oz, and Ivan Perez (Eds.). Springer International Publishing, Cham, 268\u2013286."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487212.3487340"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8957641","article-title":"RIPTE: runtime integrity protection based on trusted execution for IoT device","volume":"2020","author":"Qin Yu","year":"2020","unstructured":"Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, and Wei Feng. 2020. RIPTE: runtime integrity protection based on trusted execution for IoT device. Security and Communication Networks 2020 (2020), 1\u201314.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_17_1","first-page":"197","article-title":"Orchestrating Layered Attestations, In Principles of Security and Trust, Flemming Nielson and David Sands (Eds.)","volume":"11426","author":"Ramsdell D.","year":"2019","unstructured":"John\u00a0D. Ramsdell, Paul\u00a0D. Rowe, Perry Alexander, Sarah\u00a0C. Helble, Peter Loscocco, J.\u00a0Aaron Pendergrass, and Adam Petz. 2019. Orchestrating Layered Attestations, In Principles of Security and Trust, Flemming Nielson and David Sands (Eds.). LNCS 11426, 197\u2013221. https:\/\/ku-sldg.github.io\/copland\/resources\/copland-post-2019.pdf.","journal-title":"LNCS"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46263-9_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479394.3479418"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564100"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579988.3585056"}],"event":{"name":"PPDP 2024: 26th International Symposium on Principles and Practice of Declarative Programming","acronym":"PPDP 2024","location":"Milano Italy"},"container-title":["Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678232.3678244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678232.3678244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:09Z","timestamp":1750287249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678232.3678244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":21,"alternative-id":["10.1145\/3678232.3678244","10.1145\/3678232"],"URL":"https:\/\/doi.org\/10.1145\/3678232.3678244","relation":{},"subject":[],"published":{"date-parts":[[2024,9,9]]},"assertion":[{"value":"2024-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}