{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:21:06Z","timestamp":1730298066120,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/sose.2019.00036","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:09:04Z","timestamp":1557788944000},"page":"209-2095","source":"Crossref","is-referenced-by-count":1,"title":["SDVisor: Secure Debug Enclave with Hypervisor"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Hong","sequence":"first","affiliation":[]},{"given":"Zinan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Software Guard Extensions Programming Reference","year":"2014","author":"intel","key":"ref10"},{"journal-title":"Intel® software guard extensions (Intel ® SGX) licensee guide","year":"0","key":"ref11"},{"key":"ref12","first-page":"1","article-title":"Intel® software guard extensions: EPID provisioning and attestation services","volume":"1","author":"johnson","year":"2016","journal-title":"White Paper"},{"key":"ref13","article-title":"Innovative technology for CPU based attestation and sealing","volume":"13","author":"anati","year":"2013","journal-title":"Proceedings of the 2nd international workshop on hardware andarchitectural support for security and privacy"},{"journal-title":"Hardware assisted virtualization intel virtualization technology","first-page":"1","year":"2008","author":"zabaljauregui","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0129-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294294"},{"volume":"3","journal-title":"Intel IA-64 Architecture Software Developer s Manual","year":"2011","author":"guide","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1535\/itj.1003.01","article-title":"Intel virtualization technology: hardware support for efficient processor virtualization","volume":"10","author":"neiger","year":"2006","journal-title":"Intel Technology Journal"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"ref3","article-title":"Innovative technology for CPU based attestation and sealing","volume":"13","author":"anati","year":"2013","journal-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2666091"},{"journal-title":"Simon Johnson (Intel) Dan Z (Intel) DEREK B (Intel)","article-title":"Intel® SGX: debug, production, pre-release--what's the difference?","year":"2016","key":"ref9"},{"key":"ref20","first-page":"225","article-title":"Kvm: the Linux virtual machine monitor","volume":"1","author":"kivity","year":"2007","journal-title":"Proceedings of the Linux Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.237"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1360\/N112017-00071"},{"journal-title":"Tamper-resistant Execution in An Untrusted Operating System Using A Virtual Machine Monitor","year":"2007","author":"chen","key":"ref23"}],"event":{"name":"2019 IEEE International Conference on Service-Oriented System Engineering (SOSE)","start":{"date-parts":[[2019,4,4]]},"location":"San Francisco East Bay, CA, USA","end":{"date-parts":[[2019,4,9]]}},"container-title":["2019 IEEE International Conference on Service-Oriented System Engineering (SOSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8698745\/8705776\/08705929.pdf?arnumber=8705929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:26:51Z","timestamp":1658262411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8705929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/sose.2019.00036","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}