{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:28:09Z","timestamp":1725773289023},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tetc.2023.3281738","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T17:56:11Z","timestamp":1685987771000},"page":"386-398","source":"Crossref","is-referenced-by-count":3,"title":["Private Delegated Computations Using Strong Isolation"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4431-8240","authenticated-orcid":false,"given":"Mathias","family":"Brossard","sequence":"first","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-3298-8988","authenticated-orcid":false,"given":"Guilhem","family":"Bryant","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"given":"Basma El","family":"Gaabouri","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4592-6603","authenticated-orcid":false,"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[{"name":"IoTex.io, Silicon Valley, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0000-4182-9761","authenticated-orcid":false,"given":"Alexandre","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0009-0004-2376-9354","authenticated-orcid":false,"given":"Edmund Grimley","family":"Evans","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7340-4669","authenticated-orcid":false,"given":"Christopher","family":"Haster","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1784-4512","authenticated-orcid":false,"given":"Evan","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7051-6190","authenticated-orcid":false,"given":"Derek","family":"Miller","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"given":"Fan","family":"Mo","sequence":"additional","affiliation":[{"name":"Imperial College London, London, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4643-3541","authenticated-orcid":false,"given":"Dominic P.","family":"Mulligan","sequence":"additional","affiliation":[{"name":"Arm Research, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0009-0000-6437-6902","authenticated-orcid":false,"given":"Nick","family":"Spinale","sequence":"additional","affiliation":[{"name":"Arm Research, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0968-2496","authenticated-orcid":false,"given":"Eric","family":"van Hensbergen","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2456-3575","authenticated-orcid":false,"given":"Hugo J. M.","family":"Vincent","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9312-195X","authenticated-orcid":false,"given":"Shale","family":"Xiong","sequence":"additional","affiliation":[{"name":"Systems Research Group, Arm Ltd., Cambridge, U.K."}]}],"member":"263","reference":[{"key":"ref1","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Bulck"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22863-6_24"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35308-6_12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303976"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1851276.1851284"},{"key":"ref9","first-page":"225","article-title":"KVM: The Linux virtual machine monitor","volume-title":"Proc. Ottawa Linux Symp.","author":"Kivity"},{"key":"ref10","first-page":"419","article-title":"Firecracker: Lightweight virtualization for serverless applications","volume-title":"Proc. 17th Usenix Conf. Netw. Syst. Des. Implementation","author":"Agache"},{"key":"ref11","first-page":"137","article-title":"MapReduce: Simplified data processing on large clusters","volume-title":"Proc. 6th Symp. Operating Syst. Des. Implementation","author":"Dean"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2986"},{"key":"ref13","article-title":"Arms platform security architecture (PSA) attestation token","author":"Tschofenig","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24078"},{"key":"ref15","first-page":"523","article-title":"Hacking in darkness: Return-oriented programming against secure enclaves","volume-title":"Proc. 26th USENIX Conf. Secur. Symp.","author":"Lee"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref18","article-title":"Rust SGX SDK","author":"Duan","year":"2020"},{"key":"ref19","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Conf. Secur. Symp.","author":"Ohrimenko"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/gce.2008.4738445"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1101499.1101515"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom2018.2018.00053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_11"},{"key":"ref27","first-page":"689","article-title":"SCONE: Secure Linux containers with Intel SGX","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Des. Implementation","author":"Arnautov"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354220"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314605"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3290390"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"ref32","first-page":"1433","article-title":"Swivel: Hardening WebAssembly against spectre","volume-title":"Proc. USENIX Secur. Symp.","author":"Narayan"},{"key":"ref33","article-title":"The Supervisionary proof-checking kernel, or: A work-in-progress towards proof-generating code (extended abstract)","author":"Mulligan","year":"2022"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10474150\/10144599.pdf?arnumber=10144599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T13:50:03Z","timestamp":1711461003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10144599\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2023.3281738","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}