Understanding Trust Assumptions for Attestation in Confidential Computing | IEEE Conference Publication | IEEE Xplore