参考文献
[1]TPM 2.0 Library|Trusted Computing Group[OL]. [20221017]. https:trustedcomputinggroup.orgresourcetpmlibraryspecification 2019,10[2]Shen Youren, Tian Hongliang, Chen Yu, et al. Occlum: Secure and efficient multitasking inside a single enclave of Intel SGX[OL]. 2020 [20221017]. https:arxiv.orgabs2001.07450 [3]Brickell E, Camenisch J, Chen L. Direct anonymous attestation[JOL]. 2004 [20221017]. https:dl.acm.orgdoiabs10.11451030083.1030103[4]Demerjian C. Remote security exploit in all 2008+ Intel platforms[OL]. 2017 [20221017]. https:semiaccurate.com20170501 remotesecurityexploit2008intelplatforms[5]Dan M, et al. Securityfirst architecture: Deploying physically isolated active security processors for safeguarding the future of computing[JOL]. 2018 [20221017]. https:cybersecurity.springeropen.comarticles10.1186s424000180001z#Abs1