{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:53Z","timestamp":1772041613732,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.23919\/fruct54823.2022.9770907","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:32:27Z","timestamp":1652301147000},"page":"189-200","source":"Crossref","is-referenced-by-count":10,"title":["Towards Interoperable Enclave Attestation: Learnings from Decades of Academic Work"],"prefix":"10.23919","author":[{"given":"Arto","family":"Niemi","sequence":"first","affiliation":[{"name":"Huawei Technologies Oy (Finland) Co Ltd.,Helsinki,Finland"}]},{"given":"Sampo","family":"Sovio","sequence":"additional","affiliation":[{"name":"Huawei Technologies Oy (Finland) Co Ltd.,Helsinki,Finland"}]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[{"name":"Huawei Technologies Oy (Finland) Co Ltd.,Helsinki,Finland"}]}],"member":"263","reference":[{"key":"ref39","article-title":"A cryptographic view of deep-attestation, or how to do provably-secure layer-linking","author":"arfaoui","year":"0"},{"key":"ref38","article-title":"Strengthening VM isolation with integrity protection and more","author":"sev-snp","year":"2020","journal-title":"AMD White Paper"},{"key":"ref33","article-title":"Arm CCA security model 1.0","year":"2021","journal-title":"Tech Rep ARM Limited"},{"key":"ref32","article-title":"Introducing Arm Confidential Compute Architecture","year":"2021","journal-title":"Tech Rep ARM Limited"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00161"},{"key":"ref30","first-page":"1598","article-title":"Enclavisor: A hardware-software co-design for enclaves on untrusted cloud","volume":"70","author":"gu","year":"2021","journal-title":"IEEE Transactions on Computers"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2019.00024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484779"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"ref34","article-title":"Arm Confidential Compute Architecture software stack","year":"2021","journal-title":"Tech Rep ARM Limited"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"ref62","article-title":"Custom attestation data formats for open enclave","author":"gupta","year":"0"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484532"},{"key":"ref63","article-title":"Asylo: An open and flexible framework for enclave applications","year":"0"},{"key":"ref28","article-title":"Supporting third party attestation for Intel SGX with Intel data center attestation primitives","author":"scarlata","year":"2018","journal-title":"White Paper"},{"key":"ref64","article-title":"Asylo assertion generator enclave","year":"0"},{"key":"ref27","article-title":"Innovative technology for CPU based attestation and sealing","author":"anati","year":"2013","journal-title":"Intel Corporation Tech Rep"},{"key":"ref65","article-title":"AWS -AWS Nitro enclaves user guide","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00025"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref20","year":"2021","journal-title":"DICE Attestation Architecture"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043580"},{"key":"ref21","article-title":"A ten-page introduction to trusted computing","author":"martin","year":"2008","journal-title":"Oxford University Computing Laboratory Tech Rep"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0067"},{"key":"ref26","article-title":"MAGE: Mutual attestation for a group of enclaves without trusted third parties","author":"chen","year":"2022","journal-title":"31st USENIX Security Symposium (USENIX Security 22)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_14"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91625-1_10"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527978"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314363"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/11542322_6"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8152"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5652"},{"key":"ref55","article-title":"A survey of JSON-compatible binary serialization specifications","author":"viotti","year":"2022","journal-title":"CoRR"},{"key":"ref54","author":"larmouth","year":"2000","journal-title":"ASN 1 complete"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8949"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067697"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119220"},{"key":"ref40","first-page":"109","article-title":"Lightweight remote attestation using physical functions","author":"sadeghi","year":"2011","journal-title":"Proceedings of the fourth ACM conference on Wireless network security - WiSec '11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3470535"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00869-4"},{"key":"ref13","article-title":"Remote attestation procedures architecture","author":"birkholz","year":"2021","journal-title":"draft-ietf-rats-architecture"},{"key":"ref14","article-title":"Reference interaction models for remote attestation procedures","author":"birkholz","year":"2021","journal-title":"draft-ietf-rats-reference-interaction-models-05"},{"key":"ref15","article-title":"The entity attestation token (eat)","author":"birkholz","year":"2021","journal-title":"draft-ietf-rats-eat-11"},{"key":"ref16","article-title":"Report on NFV remote attestation architecture","year":"2019","journal-title":"Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) Sophia Antipolis Cedex FR Group report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087421"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456243"},{"key":"ref19","article-title":"Attestation verification service \/veraison)","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"ref3","author":"segall","year":"2017","journal-title":"Trusted Platform Modules Why when and how to use them"},{"key":"ref6","article-title":"Trustworthy services through attestation","author":"lyle","year":"2011","journal-title":"Ph D Dissertation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.393"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102117"},{"key":"ref49","article-title":"Attestation forwarding","author":"brossard","year":"2021","journal-title":"US 2021\/0409404 A1"},{"key":"ref7","first-page":"314","article-title":"Fides: Unleashing the full potential of remote attestation","author":"pr\u00fcnster","year":"2021","journal-title":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications SECRYPT&#x2019;19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102498"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref45","article-title":"Improving cloud security using secure enclaves","author":"beekman","year":"2016","journal-title":"Ph D Dissertation"},{"key":"ref48","article-title":"Veracruz attestation","author":"project","year":"2021"},{"key":"ref47","article-title":"Verifiable data structures","author":"eijdenberg","year":"2015"},{"key":"ref42","first-page":"67","article-title":"Property-based attestation for computing platforms: caring about properties, not mechanisms","author":"sadeghi","year":"2004","journal-title":"Proceedings of the 2004 workshop on New security paradigms  - NSPW '04"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45871-7_19"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897895"},{"key":"ref43","article-title":"Semantic remote attestation&#x2014;a virtual machine directed approach to trusted computing","volume":"2004","author":"haldar","year":"2004","journal-title":"USENIX Virtual Machine Research and Technology Symposium"}],"event":{"name":"2022 31st Conference of Open Innovations Association (FRUCT)","location":"Helsinki, Finland","start":{"date-parts":[[2022,4,27]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["2022 31st Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9770852\/9770880\/09770907.pdf?arnumber=9770907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:48Z","timestamp":1656965388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":65,"URL":"https:\/\/doi.org\/10.23919\/fruct54823.2022.9770907","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}