{"id":"https://openalex.org/W4415746177","doi":"https://doi.org/10.1109/icsme64153.2025.00040","title":"Trust and Verify: Formally Verified and Upgradable Trusted Functions","display_name":"Trust and Verify: Formally Verified and Upgradable Trusted Functions","publication_year":2025,"publication_date":"2025-09-07","ids":{"openalex":"https://openalex.org/W4415746177","doi":"https://doi.org/10.1109/icsme64153.2025.00040"},"language":null,"primary_location":{"id":"doi:10.1109/icsme64153.2025.00040","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060281440","display_name":"Marcus Birgersson","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Marcus Birgersson","raw_affiliation_strings":["KTH Royal Institute of Technology"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063347761","display_name":"Cyrille Artho","orcid":"https://orcid.org/0000-0002-3656-1614"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Cyrille Artho","raw_affiliation_strings":["KTH Royal Institute of Technology"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073362414","display_name":"Musard Balliu","orcid":"https://orcid.org/0000-0001-6005-5992"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Musard Balliu","raw_affiliation_strings":["KTH Royal Institute of Technology"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060281440"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1658388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"356","last_page":"367"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6029999852180481},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5906999707221985},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5881999731063843},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.566100001335144},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.5120999813079834},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.49889999628067017},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4837000072002411},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.47290000319480896},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.44670000672340393}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8234000205993652},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6029999852180481},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5906999707221985},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.566100001335144},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.5120999813079834},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4837000072002411},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.47290000319480896},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.44670000672340393},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42829999327659607},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4099999964237213},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.39980000257492065},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3490999937057495},{"id":"https://openalex.org/C184596265","wikidata":"https://www.wikidata.org/wiki/Q2651576","display_name":"Model of computation","level":3,"score":0.3296999931335449},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32359999418258667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31850001215934753},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3091999888420105},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.26489999890327454},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsme64153.2025.00040","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4318197509","display_name":null,"funder_award_id":"Knut and Alice Wallenberg Foundation","funder_id":"https://openalex.org/F4320322327","funder_display_name":"Knut och Alice Wallenbergs Stiftelse"}],"funders":[{"id":"https://openalex.org/F4320322327","display_name":"Knut och Alice Wallenbergs Stiftelse","ror":"https://ror.org/004hzzk67"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1546258910","https://openalex.org/W1565541828","https://openalex.org/W1997201541","https://openalex.org/W2034711041","https://openalex.org/W2052363833","https://openalex.org/W2586755859","https://openalex.org/W2606882085","https://openalex.org/W2886209944","https://openalex.org/W2912911518","https://openalex.org/W2954975888","https://openalex.org/W2971879009","https://openalex.org/W2980019266","https://openalex.org/W2987975352","https://openalex.org/W3006403184","https://openalex.org/W3046846052","https://openalex.org/W3047945658","https://openalex.org/W3109957654","https://openalex.org/W3115784350","https://openalex.org/W3130340352","https://openalex.org/W3171119979","https://openalex.org/W4207066313","https://openalex.org/W4213345993","https://openalex.org/W4226460782","https://openalex.org/W4236786653","https://openalex.org/W4280498870","https://openalex.org/W4311925389","https://openalex.org/W4384345766","https://openalex.org/W4390603516","https://openalex.org/W4391222241","https://openalex.org/W4403919433","https://openalex.org/W4413679933"],"related_works":[],"abstract_inverted_index":{"Computation":[0],"over":[1],"sensitive":[2],"data":[3],"requires":[4],"that":[5,59,66,91],"the":[6,22,26,37,45,49,53,67,70,75,98,105,110,116,125,143,146],"computation":[7,71,106],"function":[8,72,107],"is":[9],"secure":[10,30],"and":[11,123],"trusted.":[12],"Existing":[13],"approaches":[14],"either":[15],"do":[16],"not":[17],"enforce":[18],"formal":[19,62,117],"verification,":[20],"require":[21],"user":[23],"to":[24,64,74],"verify":[25],"proof,":[27],"or":[28],"lack":[29],"attestation":[31,83,111],"guarantees.":[32],"In":[33],"addition,":[34],"neither":[35],"addresses":[36],"issue":[38],"of":[39,69,104,136,145],"having":[40],"users":[41],"once":[42],"again":[43],"inspect":[44],"application":[46],"after":[47],"upgrading":[48],"code":[50],"running":[51],"in":[52],"enclave.":[54],"We":[55,121],"propose":[56],"an":[57,133],"approach":[58],"uses":[60],"a":[61,85,149],"specification":[63,118],"guarantee":[65],"behavior":[68],"conforms":[73],"desired":[76],"functionality.":[77],"By":[78],"combining":[79],"automated":[80],"verification":[81],"with":[82],"on":[84,127],"trusted":[86],"execution":[87],"environment,":[88],"we":[89,101,141],"ensure":[90],"only":[92,137],"conformant":[93],"applications":[94],"are":[95],"executed.":[96],"At":[97],"same":[99],"time,":[100],"allow":[102],"updates":[103],"without":[108],"changing":[109],"response,":[112],"as":[113,115],"long":[114],"still":[119],"holds.":[120],"implement":[122],"evaluate":[124],"system":[126,147],"several":[128],"functions;":[129],"our":[130],"results":[131],"show":[132],"average":[134],"overhead":[135],"50":[138],"%.":[139],"Finally,":[140],"demonstrate":[142],"validity":[144],"using":[148],"real-world":[150],"application,":[151],"Dafny-EVM.":[152]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-31T00:00:00"}
