{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:54:48Z","timestamp":1770069288272,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","funder":[{"name":"Christian Doppler Gesellschaft"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765128","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"4514-4528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3413-1722","authenticated-orcid":false,"given":"Daniel","family":"Hugenroth","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1713-3347","authenticated-orcid":false,"given":"Mario","family":"Lins","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1566-4646","authenticated-orcid":false,"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0818-6535","authenticated-orcid":false,"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/tamarin-prover.com\/. Last accessed","author":"Cremers David","year":"2025","unstructured":"Basin, David and Cremers, Cas and Dreier, Jannik and Meier, Simon and Sasse, Ralf and Schmidt, Benedikt. 2025. Tamarin Prover. https:\/\/tamarin-prover.com\/. Last accessed January 2025."},{"key":"e_1_3_2_2_2_1","unstructured":"Cliff L. Biffle. 2024. The Typestate Pattern in Rust. http:\/\/cliffle.com\/blog\/rust-typestate\/. Last accessed December 2024."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-022-09607-z"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593856.3595900"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_2_6_1","first-page":"4733","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen Hongbo","year":"2023","unstructured":"Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, and XiaoFeng Wang. 2023. A verified confidential computing as a service framework for privacy preservation. In 32nd USENIX Security Symposium (USENIX Security 23). 4733-4750."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/www.mercurial-scm.org. Last accessed","author":"Mercurial Homepage Mercurial","year":"2024","unstructured":"Mercurial community. 2024. Mercurial Homepage. https:\/\/www.mercurial-scm.org. Last accessed November 2024."},{"key":"e_1_3_2_2_8_1","volume-title":"Intel Trust Domain Extensions (Intel TDX). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/overview.html. Last accessed","author":"Intel Corporation","year":"2024","unstructured":"Intel Corporation. 2024. Intel Trust Domain Extensions (Intel TDX). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/overview.html. Last accessed November 2024."},{"key":"e_1_3_2_2_9_1","volume-title":"EPrint Arch","author":"Costan Victor","year":"2016","unstructured":"Victor Costan. 2016. Intel SGX explained. IACR Cryptol, EPrint Arch (2016)."},{"key":"e_1_3_2_2_10_1","unstructured":"Cybersecurity & Infrastructure Security Agency. 2021. Emergenc Directive ED 21-01: Mitigate SolarWinds Orion Code Compromise."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664288"},{"key":"e_1_3_2_2_12_1","unstructured":"Adam Eijdenberg Ben Laurie and Al Cutter. 2015. Verifiable data structures. Google Research Tech. Rep (2015)."},{"key":"e_1_3_2_2_13_1","unstructured":"Holger Levsen et al. 2025. Overview of various statistics about reproducible builds. https:\/\/tests.reproducible-builds.org\/debian\/reproducible.html. Last accessed April 2025."},{"key":"e_1_3_2_2_14_1","volume-title":"in-toto: A framework to secure the integrity of software supply chains. https:\/\/in-toto.io\/. Last accessed","author":"Foundation The Linux","year":"2024","unstructured":"The Linux Foundation. 2024. in-toto: A framework to secure the integrity of software supply chains. https:\/\/in-toto.io\/. Last accessed November 2024."},{"key":"e_1_3_2_2_15_1","volume-title":"Safeguarding artifact integrity across any software supply chain. https:\/\/slsa.dev\/. Last accessed","author":"Foundation The Linux","year":"2025","unstructured":"The Linux Foundation. 2025. Safeguarding artifact integrity across any software supply chain. https:\/\/slsa.dev\/. Last accessed April 2025."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179320"},{"key":"e_1_3_2_2_17_1","volume-title":"Robin Leander Schr\u00f6der, and Daniel Gruss","author":"Gast Stefan","year":"2025","unstructured":"Stefan Gast, Hannes Weissteiner, Robin Leander Schr\u00f6der, and Daniel Gruss. 2025. CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP. In Network and Distributed System Security (NDSS) Symposium 2025. https:\/\/www.ndss-symposium.org\/ndss2025\/ Network and Distributed System Security Symposium 2025 : NDSS 2025, NDSS 2025 ; Conference date: 23-02-2025 Through 28-02-2025."},{"key":"e_1_3_2_2_18_1","volume-title":"Bits from the Release Team: Cambridge sprint update. https:\/\/lists.debian.org\/debian-devel-announce\/2023\/12\/msg00003.html. Last accessed","author":"Gevers Paul","year":"2025","unstructured":"Paul Gevers. 2023. Bits from the Release Team: Cambridge sprint update. https:\/\/lists.debian.org\/debian-devel-announce\/2023\/12\/msg00003.html. Last accessed April 2025."},{"key":"e_1_3_2_2_19_1","unstructured":"Maria Glukhova et al. 2017. Tools for ensuring reproducible builds for open-source software. (2017)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_2_21_1","volume-title":"gVisor Homepage. https:\/\/gvisor.dev\/. Last accessed","author":"Visor Authors The","year":"2025","unstructured":"The gVisor Authors. 2025. gVisor Homepage. https:\/\/gvisor.dev\/. Last accessed January 2025."},{"key":"e_1_3_2_2_22_1","unstructured":"Jossef Harush. 2025. Large Scale Campaign Created Fake GitHub Projects Clones with Fake Commit Added Malware. https:\/\/checkmarx.com\/blog\/large-scale-campaign-created-fake-github-projects-clones-with-fake-commit-added-malware\/. Last accessed January 2025."},{"key":"e_1_3_2_2_23_1","volume-title":"AMD Secure Encrypted Virtualization (SEV). https:\/\/www.amd.com\/en\/developer\/sev.html. Last accessed","author":"Advanced Micro Devices Inc.","year":"2024","unstructured":"Advanced Micro Devices Inc., 2024a. AMD Secure Encrypted Virtualization (SEV). https:\/\/www.amd.com\/en\/developer\/sev.html. Last accessed November 2024."},{"key":"e_1_3_2_2_24_1","volume-title":"GitHub Actions: automate your workflow from idea to production. https:\/\/github.com\/features\/actions. Last accessed","author":"GitHub Inc.","year":"2024","unstructured":"GitHub Inc., 2024b. GitHub Actions: automate your workflow from idea to production. https:\/\/github.com\/features\/actions. Last accessed November 2024."},{"key":"e_1_3_2_2_25_1","volume-title":"https:\/\/github.com\/. Last accessed","author":"GitHub Inc.","year":"2024","unstructured":"GitHub Inc., 2024c. GitHub Homepage. https:\/\/github.com\/. Last accessed November 2024."},{"key":"e_1_3_2_2_26_1","volume-title":"https:\/\/about.gitlab.com\/. Last accessed","author":"GitLab Inc.","year":"2024","unstructured":"GitLab Inc., 2024d. GitLab Homepage. https:\/\/about.gitlab.com\/. Last accessed November 2024."},{"key":"e_1_3_2_2_27_1","volume-title":"2024 e. NetBSD fully reproducible builds. https:\/\/blog.netbsd.org\/tnf\/entry\/netbsd_fully_reproducible_builds. Last accessed","author":"The NetBSD Foundation Inc.","year":"2024","unstructured":"The NetBSD Foundation Inc., 2024 e. NetBSD fully reproducible builds. https:\/\/blog.netbsd.org\/tnf\/entry\/netbsd_fully_reproducible_builds. Last accessed November 2024."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176285"},{"key":"e_1_3_2_2_29_1","volume-title":"Introduction to modern cryptography: principles and protocols","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell. 2007. Introduction to modern cryptography: principles and protocols. Chapman and hall\/CRC."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3073045"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659897"},{"key":"e_1_3_2_2_33_1","first-page":"557","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In 26th USENIX Security Symposium (USENIX Security 17). 557-574."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833768"},{"key":"e_1_3_2_2_35_1","first-page":"717","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). 717-732."},{"key":"e_1_3_2_2_36_1","volume-title":"On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ. arXiv preprint arXiv:2404.08987","author":"Lins Mario","year":"2024","unstructured":"Mario Lins, Ren\u00e9 Mayrhofer, Michael Roland, Daniel Hofer, and Martin Schwaighofer. 2024. On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ. arXiv preprint arXiv:2404.08987 (2024)."},{"key":"e_1_3_2_2_37_1","volume-title":"Bitbucket - Git solution for teams using JIRA. https:\/\/bitbucket.org\/product\/. Last accessed","author":"Ltd Atlassian Pty","year":"2024","unstructured":"Atlassian Pty Ltd. 2024. Bitbucket - Git solution for teams using JIRA. https:\/\/bitbucket.org\/product\/. Last accessed November 2024."},{"key":"e_1_3_2_2_38_1","volume-title":"Last accessed","year":"2025","unstructured":"LWN.net. 2025. Debian bookworm live images now fully reproducible. https:\/\/lwn.net\/Articles\/1015402\/, Last accessed April 2025."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.158"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378519"},{"key":"e_1_3_2_2_43_1","first-page":"3439","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Neupane Shradha","year":"2023","unstructured":"Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, and Lorenzo De Carli. 2023. Beyond typosquatting: an in-depth look at package confusion. In 32nd USENIX Security Symposium (USENIX Security 23). 3439-3456."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"key":"e_1_3_2_2_45_1","first-page":"1271","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Nikitin Kirill","year":"2017","unstructured":"Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. 2017. CHAINIAC: Proactive Software-Update transparency via collectively signed skipchains and verified builds. In 26th USENIX Security Symposium (USENIX Security 17). 1271-1287."},{"key":"e_1_3_2_2_46_1","volume-title":"Deterministic Builds Part One: Cyberwar and Global Compromise. https:\/\/blog.torproject.org\/deterministic-builds-part-one-cyberwar-and-global-compromise\/. Last accessed","author":"Perry Mike","year":"2024","unstructured":"Mike Perry and The Tor Project. 2024. Deterministic Builds Part One: Cyberwar and Global Compromise. https:\/\/blog.torproject.org\/deterministic-builds-part-one-cyberwar-and-global-compromise\/. Last accessed November 2024."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_2_48_1","volume-title":"https:\/\/wiki.debian.org\/ReproducibleBuilds\/About. Last accessed","author":"Project Debian","year":"2024","unstructured":"Debian Project. 2024. Reproducible Builds. https:\/\/wiki.debian.org\/ReproducibleBuilds\/About. Last accessed November 2024."},{"key":"e_1_3_2_2_49_1","volume-title":"https:\/\/www.jenkins.io\/. Last accessed","author":"Jenkins Homepage Jenkins","year":"2024","unstructured":"Jenkins project. 2024a. Jenkins Homepage. https:\/\/www.jenkins.io\/. Last accessed November 2024."},{"key":"e_1_3_2_2_50_1","volume-title":"https:\/\/bootstrappable.org\/. Last accessed","author":"Bootstrappable Builds The Bootstrappable","year":"2024","unstructured":"The Bootstrappable Builds project. 2024b. Bootstrappable Builds. https:\/\/bootstrappable.org\/. Last accessed November 2024."},{"key":"e_1_3_2_2_51_1","volume-title":"Deterministic builds. https:\/\/chromium.googlesource.com\/chromium\/src\/\/HEAD\/docs\/deterministic_builds.md. Last accessed","author":"Project The Chromium","year":"2024","unstructured":"The Chromium Project. 2024. Deterministic builds. https:\/\/chromium.googlesource.com\/chromium\/src\/\/HEAD\/docs\/deterministic_builds.md. Last accessed November 2024."},{"key":"e_1_3_2_2_52_1","volume-title":"https:\/\/git-scm.com. Last accessed","author":"Git Homepage The Git","year":"2024","unstructured":"The Git project. 2024a. Git Homepage. https:\/\/git-scm.com. Last accessed November 2024."},{"key":"e_1_3_2_2_53_1","volume-title":"Git Tools Signing your work. https:\/\/git-scm.com\/book\/ms\/v2\/Git-Tools-Signing-Your-Work. Last accessed","author":"The Git","year":"2025","unstructured":"The Git project. 2024b. Git Tools Signing your work. https:\/\/git-scm.com\/book\/ms\/v2\/Git-Tools-Signing-Your-Work. Last accessed January 2025."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3689949"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/3696933.3696941"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3092692"},{"key":"e_1_3_2_2_57_1","unstructured":"Gary Simpson Amy Nelson Shiva Dasari Ken Goldman Nayna Jain Jiewen Yao Qin Long Robert Hart Ronald Aigner and Dick Wilkins. 2019. TCG PC Client Specific Platform Firmware Profile Specification. Technical Report. Trusted Computing Group. Version 1.04 https:\/\/trustedcomputinggroup.org\/resource\/pc-client-specific-platform-firmware-profile-specification\/. Last accessed November 2024."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322228"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_7"},{"key":"e_1_3_2_2_60_1","volume-title":"SUNSPOT: An Implant in the Build Process.","author":"Intelligence Team CrowdStrike","year":"2021","unstructured":"CrowdStrike Intelligence Team. 2021. SUNSPOT: An Implant in the Build Process. (2021). https:\/\/www.crowdstrike.com\/en-us\/blog\/sunspot-malware-technical-analysis\/. Last accessed January 2025."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"e_1_3_2_2_62_1","volume-title":"SGAxe: How SGX fails in practice. https:\/\/sgaxe.com\/files\/SGAxe.pdf. Last accessed","author":"Schaik Stephan Van","year":"2024","unstructured":"Stephan Van Schaik, Andrew Kwong, Daniel Genkin, and Yuval Yarom. 2020. SGAxe: How SGX fails in practice. https:\/\/sgaxe.com\/files\/SGAxe.pdf. Last accessed November 2024."},{"key":"e_1_3_2_2_63_1","volume-title":"AWS Nitro Enclaves. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/. Last accessed","author":"Amazon","year":"2024","unstructured":"Amazon web services. 2024. AWS Nitro Enclaves. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/. Last accessed December 2024."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.17"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690230"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513050"},{"key":"e_1_3_2_2_67_1","volume-title":"The Untold Story of the Boldest Supply-Chain Hack Ever. Wired","author":"Zetter Kim","year":"2023","unstructured":"Kim Zetter. 2023. The Untold Story of the Boldest Supply-Chain Hack Ever. Wired (2023)."},{"key":"e_1_3_2_2_68_1","first-page":"1135","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Zhang Ruiyi","year":"2024","unstructured":"Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng L\u00fc, Andreas Kogler, and Michael Schwarz. 2024. CacheWarp: Software-based Fault Injection using Selective State Reset. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 1135-1151. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/zhang-ruiyi"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:21:06Z","timestamp":1766442066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":68,"alternative-id":["10.1145\/3719027.3765128","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765128","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}