{"id":"https://openalex.org/W7134279185","doi":"https://doi.org/10.48550/arxiv.2603.06326","title":"Designing Trustworthy Layered Attestations","display_name":"Designing Trustworthy Layered Attestations","publication_year":2026,"publication_date":"2026-03-06","ids":{"openalex":"https://openalex.org/W7134279185","doi":"https://doi.org/10.48550/arxiv.2603.06326"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2603.06326","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018544156","display_name":"Will Thomas","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thomas, Will","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114792277","display_name":"Logan Schmalz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schmalz, Logan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027425888","display_name":"Adam Petz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Petz, Adam","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042452819","display_name":"Perry Alexander","orcid":"https://orcid.org/0000-0002-5387-9157"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexander, Perry","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069090711","display_name":"Joshua D. Guttman","orcid":"https://orcid.org/0000-0002-7189-1758"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guttman, Joshua D.","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000552585","display_name":"Paul D. Rowe","orcid":"https://orcid.org/0000-0003-1942-640X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rowe, Paul D.","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5128599626","display_name":"James Carter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carter, James","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5018544156"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7954000234603882},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.7124999761581421},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6039999723434448},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5095000267028809},{"id":"https://openalex.org/keywords/structuring","display_name":"Structuring","score":0.5060999989509583},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4771000146865845},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4458000063896179},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4203999936580658},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3889999985694885}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7954000234603882},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.7124999761581421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6967999935150146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6753000020980835},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6039999723434448},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5095000267028809},{"id":"https://openalex.org/C2775945657","wikidata":"https://www.wikidata.org/wiki/Q381442","display_name":"Structuring","level":2,"score":0.5060999989509583},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4771000146865845},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4458000063896179},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4203999936580658},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3889999985694885},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3416000008583069},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2603.06326","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2603.06326","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.06326","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2603.06326","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.7553454041481018,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Attestation":[0],"means":[1],"providing":[2],"evidence":[3,63],"that":[4,130],"a":[5,36,80,98,127,136],"remote":[6],"target":[7,69,76],"system":[8,38,77,93,132],"is":[9,19,104,177],"worthy":[10],"of":[11,67,83,139,152,174],"trust":[12],"for":[13,94],"some":[14],"sensitive":[15],"interaction.":[16],"Although":[17],"attestation":[18,165,176],"already":[20],"used":[21],"in":[22,126],"network":[23],"access":[24],"control,":[25],"security":[26],"management,":[27],"and":[28,115,191],"trusted":[29],"execution":[30],"environments,":[31],"it":[32],"mainly":[33],"concerns":[34],"only":[35,79],"few":[37,128],"components.":[39],"A":[40],"clever":[41],"adversary":[42,144],"might":[43],"manipulate":[44],"these":[45],"shallow":[46],"attestations":[47,54,59,96],"to":[48,89,161,198],"mislead":[49],"the":[50,68,75,153,162],"relying":[51],"party.":[52],"Reliable":[53],"require":[55],"layering.":[56],"We":[57,86,122,134,156],"construct":[58],"whose":[60],"layers":[61],"report":[62],"about":[64],"successive":[65],"components":[66,84],"system.":[70,155],"Reliability":[71],"also":[72,157,193],"requires":[73],"structuring":[74],"so":[78,164],"limited":[81],"set":[82],"matters.":[85],"show":[87],"how":[88],"structure":[90],"an":[91,149],"example":[92],"reliable":[95],"despite":[97],"well-defined,":[99],"relatively":[100],"strong":[101],"adversary.":[102],"It":[103],"based":[105],"on":[106],"widely":[107],"available":[108],"hardware,":[109],"such":[110,117],"as":[111,118,146,148],"Trusted":[112],"Platform":[113],"Modules,":[114],"software,":[116],"Linux":[119],"with":[120,202],"SELinux.":[121],"isolate":[123],"our":[124,140,143,175,183,188],"principles":[125],"maxims":[129,207],"guide":[131],"development.":[133],"provide":[135],"cogent":[137],"analysis":[138],"mechanisms":[141,163],"against":[142,168],"model,":[145],"well":[147],"empirical":[150],"appraisal":[151],"resulting":[154],"identify":[158],"two":[159],"improvements":[160],"can":[166],"succeed":[167],"strengthened":[169],"adversaries.":[170],"The":[171,205],"performance":[172],"burden":[173],"negligible,":[178],"circa":[179],"1.3":[180],"percent.":[181],"After":[182],"first":[184],"example,":[185],"we":[186],"vary":[187],"application":[189],"level,":[190],"then":[192],"its":[194],"underlying":[195],"hardware":[196],"anchor":[197],"use":[199],"confidential":[200],"computing":[201],"AMD's":[203],"SEV-SNP.":[204],"same":[206],"help":[208],"us":[209],"achieve":[210],"trustworthy":[211],"attestations.":[212]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2026-03-10T00:00:00"}
