Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? | IEEE Conference Publication | IEEE Xplore