{"id":"https://openalex.org/W4413639990","doi":"https://doi.org/10.1109/csr64739.2025.11130147","title":"Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation Capabilities","display_name":"Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation Capabilities","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413639990","doi":"https://doi.org/10.1109/csr64739.2025.11130147"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102895349","display_name":"Nikolaos Fotos","orcid":"https://orcid.org/0009-0009-8173-9555"},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Nikolaos Fotos","raw_affiliation_strings":["Universitat Polit&#x00E8;cnica de Catalunya (UPC),Department of Computer Architecture,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"Universitat Polit&#x00E8;cnica de Catalunya (UPC),Department of Computer Architecture,Barcelona,Spain","institution_ids":["https://openalex.org/I9617848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098922925","display_name":"Stefanos Vasileiadis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162980","display_name":"Ubitech (Greece)","ror":"https://ror.org/05dvp4993","country_code":"GR","type":"company","lineage":["https://openalex.org/I4210162980"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Stefanos Vasileiadis","raw_affiliation_strings":["Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece"],"affiliations":[{"raw_affiliation_string":"Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece","institution_ids":["https://openalex.org/I4210162980"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070813911","display_name":"Thanassis Giannetsos","orcid":"https://orcid.org/0000-0003-0663-2263"},"institutions":[{"id":"https://openalex.org/I4210162980","display_name":"Ubitech (Greece)","ror":"https://ror.org/05dvp4993","country_code":"GR","type":"company","lineage":["https://openalex.org/I4210162980"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Thanassis Giannetsos","raw_affiliation_strings":["Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece"],"affiliations":[{"raw_affiliation_string":"Digital Security &#x0026; Trusted Computing Group Ubitech Ltd.,Athens,Greece","institution_ids":["https://openalex.org/I4210162980"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102895349"],"corresponding_institution_ids":["https://openalex.org/I9617848"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29734055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"867","last_page":"874"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6558175086975098},{"id":"https://openalex.org/keywords/bust","display_name":"Bust","score":0.6477990746498108},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6032662391662598},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.526772141456604},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4552823305130005},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17485705018043518},{"id":"https://openalex.org/keywords/boom","display_name":"Boom","score":0.16259142756462097},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09066617488861084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6558175086975098},{"id":"https://openalex.org/C2778929795","wikidata":"https://www.wikidata.org/wiki/Q17489160","display_name":"Bust","level":3,"score":0.6477990746498108},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6032662391662598},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.526772141456604},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4552823305130005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17485705018043518},{"id":"https://openalex.org/C141441539","wikidata":"https://www.wikidata.org/wiki/Q1970908","display_name":"Boom","level":2,"score":0.16259142756462097},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09066617488861084},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr64739.2025.11130147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:doi:10.5281/zenodo.18936126","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"ConferencePaper"}],"best_oa_location":{"id":"pmh:doi:10.5281/zenodo.18936126","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"ConferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2064181616","https://openalex.org/W3121659469","https://openalex.org/W2547452570","https://openalex.org/W2059297830","https://openalex.org/W4300553720","https://openalex.org/W2480348369","https://openalex.org/W2129706069"],"abstract_inverted_index":{"With":[0],"the":[1,8,12,27,50,76,84,87,128,136,143,146],"rapid":[2],"expansion":[3],"of":[4,75,86,127,130,145],"computational":[5],"resources":[6,28],"from":[7,100],"core":[9],"cloud":[10],"towards":[11],"far-edge,":[13],"we":[14],"face":[15],"new":[16],"security":[17],"and":[18,43,102],"trust":[19],"assurance":[20],"challenges.":[21],"To":[22],"provide":[23,37],"stronger":[24],"guarantees":[25],"on":[26,83,135],"serving":[29],"sensitive":[30],"traffic":[31],"workloads,":[32],"it":[33],"is":[34,58],"necessary":[35],"to":[36,39,67,142],"mechanisms":[38],"verify":[40],"both":[41],"software":[42],"hardware":[44],"integrity":[45,95,117],"across":[46],"all":[47],"elements":[48],"comprising":[49],"compute":[51],"continuum.":[52],"Towards":[53],"this":[54],"direction,":[55],"remote":[56,70],"attestation":[57,78,122],"a":[59,64,69,113,131],"promising":[60],"mechanism":[61],"that":[62,119],"allows":[63],"third":[65],"party":[66],"ensure":[68],"entity\u2019s":[71],"integrity.":[72],"However,":[73],"many":[74],"existing":[77],"solutions":[79],"have":[80],"strong":[81],"assumptions":[82],"trustworthiness":[85],"verifying":[88],"entity,":[89],"thus":[90],"not":[91],"allowing":[92],"for":[93],"privacy-preserving":[94],"correctness.":[96],"Furthermore,":[97],"they":[98],"suffer":[99],"scalability":[101],"efficiency":[103,144],"issues":[104],"even":[105],"when":[106],"targeting":[107],"static":[108],"properties.":[109],"This":[110],"paper":[111],"presents":[112],"lightweight":[114],"runtime":[115],"configuration":[116,129],"verification":[118],"enables":[120],"implicit":[121],"without":[123],"disclosing":[124],"any":[125],"information":[126],"proving":[132],"device.":[133],"Based":[134],"presented":[137],"findings,":[138],"our":[139],"implementation":[140],"attests":[141],"proposed":[147],"solution.":[148]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
