{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:10Z","timestamp":1740169210079,"version":"3.37.3"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632009"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Guangdong Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2017A030308006"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"High-Level Talents Program of Higher Education in Guangdong Province","award":["2016ZJ01"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3021033","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T20:36:51Z","timestamp":1598992611000},"page":"163045-163059","source":"Crossref","is-referenced-by-count":4,"title":["RAitc: Securely Auditing the Remotely Executed Applications"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5027-1234","authenticated-orcid":false,"given":"Lei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Entao","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4182","authenticated-orcid":false,"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/s00145-019-09319-x"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3301285"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MICRO.2016.7783743"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ASE.2019.00061"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-981-10-6898-0_20"},{"year":"2017","author":"anderson","journal-title":"Evading machine learning malware detection","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3134600.3134620"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.23919\/DATE.2017.7926977"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/MALWARE.2015.7413680"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1007\/978-3-319-49145-5_14"},{"year":"2019","journal-title":"amark","key":"ref62"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/SP.2015.23"},{"year":"2020","journal-title":"SysBench","key":"ref63"},{"key":"ref28","first-page":"1357","article-title":"Protecting cloud virtual machines from hypervisor and host operating system exploits","author":"li","year":"2019","journal-title":"Proc 28th USENIX Secur Symp (USENIX Secur )"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/DSN48063.2020.00021"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TDSC.2018.2817545"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1007\/978-3-642-25141-2_7"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1007\/978-3-319-11203-9_13"},{"key":"ref29","first-page":"541","article-title":"vTZ: Virtualizing ARM trustzone","author":"hua","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TNET.2019.2891528"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2660267.2660356"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TIFS.2017.2705628"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ACCESS.2019.2917939"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SP.2018.00018"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3319535.3363221"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/INFOCOM.2018.8485838"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TMC.2019.2910861"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3316781.3323480"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.24251\/HICSS.2017.732"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/SP.2019.00061"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/3127323"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/TDSC.2013.53"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/SP.2017.9"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/SP.2018.00060"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/2517349.2522733"},{"key":"ref54","first-page":"253","article-title":"Taking proof-based verified computation a few steps closer to practicality","author":"setty","year":"2012","journal-title":"Proc 21st USENIX Security Symp"},{"year":"2017","author":"yao","journal-title":"SMM Protection in EDK II","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1007\/978-3-642-14623-7_25"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MM.2016.86"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-030-29962-0_11"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/SP.2013.47"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/DSN.2013.6575343"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/UIC-ATC.2017.8397459"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.14722\/ndss.2017.23227"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.cose.2019.01.012"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-540-87403-4_1"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CSCloud.2015.52"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-319-99073-6_8"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TIFS.2017.2787993"},{"key":"ref4","first-page":"1","article-title":"A survey on network security attacks and prevention mechanism","volume":"5","author":"blessy","year":"2015","journal-title":"Journal of Current Computer Science and Technolgy"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11277-014-1968-8"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/COMPSAC.2015.173"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/W-FiCloud.2016.30"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/Trustcom.2015.387"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.cose.2018.12.014"},{"key":"ref49","first-page":"841","article-title":"ftpm: A software-only implementation of a TPM chip","author":"raj","year":"2016","journal-title":"25th USENIX Secur Symp (USENIX Secur 16)"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1653662.1653711"},{"key":"ref46","first-page":"1229","article-title":"A bad dream: Subverting trusted platform module while you are sleeping","author":"han","year":"2018","journal-title":"Proc 7th USENIX Secur Symp (USENIX Secur )"},{"key":"ref45","first-page":"991","article-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proc 7th USENIX Secur Symp (USENIX Secur )"},{"year":"2004","author":"brandl","journal-title":"Trusted Computing The TCG Trusted Platform Module Specification","key":"ref48"},{"key":"ref47","first-page":"565","article-title":"Hardware-assisted on-demand hypervisor activation for efficient security critical code execution on mobile devices","author":"cho","year":"2016","journal-title":"Proc Usenix Ann Technical Conf (Usenix '99)"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/3319535.3354216"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TrustCom.2016.0096"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1007\/978-3-030-29959-0_20"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.jss.2011.06.061"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09183981.pdf?arnumber=9183981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:38Z","timestamp":1639770938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9183981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3021033","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}