{"id":"https://openalex.org/W4383221394","doi":"https://doi.org/10.1145/3579856.3582833","title":"ZEKRA: Zero-Knowledge Control-Flow Attestation","display_name":"ZEKRA: Zero-Knowledge Control-Flow Attestation","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221394","doi":"https://doi.org/10.1145/3579856.3582833"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582833","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vbn.aau.dk/ws/files/786878098/ZEKRA_Zero_Knowledge_Control_Flow_Attestation_1_.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080876033","display_name":"Heini Bergsson Debes","orcid":"https://orcid.org/0000-0002-2385-8187"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Heini Bergsson Debes","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-2385-8187","affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008574589","display_name":"Edlira Dushku","orcid":"https://orcid.org/0000-0002-4974-9739"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Edlira Dushku","raw_affiliation_strings":["Department of Electronic Systems, Aalborg University, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-4974-9739","affiliations":[{"raw_affiliation_string":"Department of Electronic Systems, Aalborg University, Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070813911","display_name":"Thanassis Giannetsos","orcid":"https://orcid.org/0000-0003-0663-2263"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thanassis Giannetsos","raw_affiliation_strings":["Digital Security &amp; Trusted Computing Group, Ubiquitous Technologies Limited, Greece"],"raw_orcid":"https://orcid.org/0000-0003-0663-2263","affiliations":[{"raw_affiliation_string":"Digital Security &amp; Trusted Computing Group, Ubiquitous Technologies Limited, Greece","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007663724","display_name":"Ali Marandi","orcid":"https://orcid.org/0000-0002-2290-4495"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ali Marandi","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-2290-4495","affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080876033"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":1.0225,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80811186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"357","last_page":"371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5782658457756042},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.5559572577476501},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4682387411594391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19798725843429565},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.0856812596321106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5782658457756042},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.5559572577476501},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4682387411594391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19798725843429565},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0856812596321106},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3579856.3582833","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/81c40412-f0a7-4a10-91d1-0448624cae38","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/81c40412-f0a7-4a10-91d1-0448624cae38","pdf_url":"https://vbn.aau.dk/ws/files/786878098/ZEKRA_Zero_Knowledge_Control_Flow_Attestation_1_.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Debes, H B, Dushku, E, Giannetsos, T & Marandi, A 2023, ZEKRA : Zero-Knowledge Control-Flow Attestation. in J Liu, Y Xiang, S Nepal & G Tsudik (eds), Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023. Association for Computing Machinery (ACM), Proceedings of the ACM Conference on Computer and Communications Security, pp. 357-371, 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, Australia, 10/07/2023. https://doi.org/10.1145/3579856.3582833","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/5142f0a8-cdfa-4141-a33a-dfa254ce8cb9","is_oa":false,"landing_page_url":"https://orbit.dtu.dk/en/publications/5142f0a8-cdfa-4141-a33a-dfa254ce8cb9","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Debes , H B , Dushku , E , Giannetsos , T &amp; Marandi , A 2023 , ZEKRA: Zero-Knowledge Control-Flow Attestation . in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security . ACM , pp. 357-371 , 2023 ACM ASIA Conference on Computer and Communications Security , Melbourne , Victoria , Australia , 10/07/2023 . https://doi.org/10.1145/3579856.3582833","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.atira.dk:publications/81c40412-f0a7-4a10-91d1-0448624cae38","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85168110958&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Debes , H B , Dushku , E , Giannetsos , T &amp; Marandi , A 2023 , ZEKRA : Zero-Knowledge Control-Flow Attestation . in ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security . Association for Computing Machinery , Proceedings of the ACM Conference on Computer and Communications Security , pp. 357-371 , 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023 , Melbourne , Australia , 10/07/2023 . https://doi.org/10.1145/3579856.3582833","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/81c40412-f0a7-4a10-91d1-0448624cae38","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/81c40412-f0a7-4a10-91d1-0448624cae38","pdf_url":"https://vbn.aau.dk/ws/files/786878098/ZEKRA_Zero_Knowledge_Control_Flow_Attestation_1_.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Debes, H B, Dushku, E, Giannetsos, T & Marandi, A 2023, ZEKRA : Zero-Knowledge Control-Flow Attestation. in J Liu, Y Xiang, S Nepal & G Tsudik (eds), Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023. Association for Computing Machinery (ACM), Proceedings of the ACM Conference on Computer and Communications Security, pp. 357-371, 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, Australia, 10/07/2023. https://doi.org/10.1145/3579856.3582833","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[{"id":"https://openalex.org/G1758561082","display_name":"Future Proofing of ICT Trust Chains: Sustainable Operational Assurance and Verification Remote Guards for Systems-of-Systems Security and Privacy","funder_award_id":"952697","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4643722325","display_name":null,"funder_award_id":"871403","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4383221394.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W1745716700","https://openalex.org/W2018746447","https://openalex.org/W2067596507","https://openalex.org/W2067700169","https://openalex.org/W2159059513","https://openalex.org/W2182467309","https://openalex.org/W2293021588","https://openalex.org/W2489890856","https://openalex.org/W2496543269","https://openalex.org/W2514974017","https://openalex.org/W2773271555","https://openalex.org/W2910327197","https://openalex.org/W3015593455","https://openalex.org/W3036196948","https://openalex.org/W4210896998","https://openalex.org/W4235603350","https://openalex.org/W4252761885"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1870614684","https://openalex.org/W194387157","https://openalex.org/W2000850689","https://openalex.org/W59628553","https://openalex.org/W1483984920","https://openalex.org/W4406460655","https://openalex.org/W2952570804"],"abstract_inverted_index":{"To":[0],"detect":[1],"runtime":[2],"attacks":[3,61],"against":[4],"programs":[5],"running":[6],"on":[7,142],"a":[8,16,101,114,128,138,152],"remote":[9,33],"computing":[10],"platform,":[11],"Control-Flow":[12],"Attestation":[13],"(CFA)":[14],"lets":[15],"(trusted)":[17],"verifier":[18,42,94],"determine":[19],"the":[20,23,32,47,71,77,80,83,93,97,107,110,120,123],"legality":[21],"of":[22,82,91,109,118,122],"program\u2019s":[24],"execution":[25,85,125,145,154,164],"path,":[26],"as":[27],"recorded":[28],"and":[29,58],"reported":[30],"by":[31,168],"platform":[34],"(prover).":[35],"However,":[36,99],"besides":[37],"complicating":[38],"scalability":[39],"due":[40],"to":[41,55,66,75,87,137,150],"complexity,":[43],"this":[44],"assumption":[45],"regarding":[46],"verifier\u2019s":[48],"trustworthiness":[49],"renders":[50],"existing":[51],"CFA":[52],"schemes":[53],"prone":[54],"privacy":[56],"breaches":[57],"implementation":[59],"disclosure":[60],"under":[62],"\u201chonest-but-curious\u201d":[63],"adversaries.":[64],"Thus,":[65],"suppress":[67],"sensitive":[68],"details":[69],"from":[70],"verifier,":[72],"we":[73,112,148],"propose":[74,113,149],"have":[76],"prover":[78],"outsource":[79],"verification":[81,121,156],"attested":[84,124],"path":[86,126,155],"an":[88,159],"intermediate":[89],"worker":[90,102,139],"which":[92],"only":[95],"learns":[96],"result.":[98],"since":[100],"might":[103],"be":[104,134,166],"dishonest":[105],"about":[106],"outcome":[108],"verification,":[111],"purely":[115],"cryptographical":[116],"solution":[117],"transforming":[119],"into":[127],"verifiable":[129],"computational":[130],"task":[131,157],"that":[132],"can":[133,165],"reliably":[135],"outsourced":[136],"without":[140],"relying":[141],"any":[143],"trusted":[144],"environment.":[146],"Specifically,":[147],"express":[151],"program-agnostic":[153],"inside":[158],"arithmetic":[160],"circuit":[161],"whose":[162],"correct":[163],"verified":[167],"untrusted":[169],"verifiers":[170],"in":[171],"zero":[172],"knowledge.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
