{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:22:17Z","timestamp":1725772937015},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387541","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-16","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Autarky"],"prefix":"10.1145","author":[{"given":"Meni","family":"Orenbach","sequence":"first","affiliation":[{"name":"Technion"}]},{"given":"Andrew","family":"Baumann","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Mark","family":"Silberstein","sequence":"additional","affiliation":[{"name":"Technion"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3307650.3322265"},{"unstructured":"ECS Bare Metal Instance. Alibaba Cloud 2018. URL https:\/\/www.alibabacloud.com\/product\/ebm. Accessed: 2019-08-08. ECS Bare Metal Instance. Alibaba Cloud 2018. URL https:\/\/www.alibabacloud.com\/product\/ebm. Accessed: 2019-08-08.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"AMD","author":"AMD","year":"2020","unstructured":"AMD SEV-SNP : Strengthening VM isolation with integrity protection and more . AMD , January 2020 . URL https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. AMD, January 2020. URL https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf."},{"key":"e_1_3_2_1_4_1","first-page":"689","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andr\u00e9 Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark Stillwell , David Goltzsche , David M. Eyers , R\u00fcdiger Kapitza , Peter R. Pietzuch , and Christof Fetzer . SCONE : Secure Linux containers with Intel SGX . In 12th USENIX Symposium on Operating Systems Design and Implementation , pages 689 -- 703 , 2016 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andr\u00e9 Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Stillwell, David Goltzsche, David M. Eyers, R\u00fcdiger Kapitza, Peter R. Pietzuch, and Christof Fetzer. SCONE: Secure Linux containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation, pages 689--703, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/3102980.3103002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/2685048.2685070"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_8_1","volume-title":"September","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Srdjan Capkun , Alexandra Dmitrienko , Tommaso Frassetto , Kari Kostiainen , Urs M\u00fcller , and Ahmad-Reza Sadeghi . DR.SGX: Hardening SGX enclaves against cache attacks with data location randomization. CoRR, abs\/1709.09917 , September 2017 . URL https:\/\/arxiv.org\/abs\/1709.09917. Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs M\u00fcller, and Ahmad-Reza Sadeghi. DR.SGX: Hardening SGX enclaves against cache attacks with data location randomization. CoRR, abs\/1709.09917, September 2017. URL https:\/\/arxiv.org\/abs\/1709.09917."},{"key":"e_1_3_2_1_9_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . Software grand exposure: SGX cache attacks are practical . In 11th USENIX Workshop on Offensive Technologies (WOOT 17) , 2017 . URL https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. Software grand exposure: SGX cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017. URL https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3092627.3092634"},{"key":"e_1_3_2_1_11_1","volume-title":"June","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H. Lai . SgxPectre attacks: Stealing Intel secrets from SGX enclaves via speculative execution. CoRR, abs\/1802.09085 , June 2018 . URL https:\/\/arxiv.org\/abs\/1802.09085. Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. SgxPectre attacks: Stealing Intel secrets from SGX enclaves via speculative execution. CoRR, abs\/1802.09085, June 2018. URL https:\/\/arxiv.org\/abs\/1802.09085."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3052973.3053007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_15_1","first-page":"857","volume-title":"25th USENIX Security Symposium","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia A. Lebedev , and Srinivas Devadas . Sanctum : Minimal hardware extensions for strong software isolation . In 25th USENIX Security Symposium , pages 857 -- 874 , 2016 . Victor Costan, Ilia A. Lebedev, and Srinivas Devadas. Sanctum: Minimal hardware extensions for strong software isolation. In 25th USENIX Security Symposium, pages 857--874, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/3277203.3277311"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3132747.3132782"},{"volume-title":"The FreeType Project","year":"2019","unstructured":"FreeType. The FreeType Project , 2019 . URL http:\/\/www.freetype.org\/. FreeType. The FreeType Project, 2019. URL http:\/\/www.freetype.org\/.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978-3-319-66332-6_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_21_1","first-page":"73","volume-title":"3rd USENIX Symposium on Operating Systems Design and Implementation","author":"Hand Steven M.","year":"1999","unstructured":"Steven M. Hand . Self-paging in the Nemesis operating system . In 3rd USENIX Symposium on Operating Systems Design and Implementation , pages 73 -- 86 , 1999 . ISBN 1-880446-39-1. URL https:\/\/www.usenix.org\/events\/osdi99\/hand.html. Steven M. Hand. Self-paging in the Nemesis operating system. In 3rd USENIX Symposium on Operating Systems Design and Implementation, pages 73--86, 1999. ISBN 1-880446-39-1. URL https:\/\/www.usenix.org\/events\/osdi99\/hand.html."},{"key":"e_1_3_2_1_22_1","volume-title":"Hanson and Arthur O'Dwyer. uthash: Hash Table for C Structures","author":"Troy","year":"2019","unstructured":"Troy D. Hanson and Arthur O'Dwyer. uthash: Hash Table for C Structures , 2019 . URL https:\/\/troydhanson.github.io\/uthash\/. Troy D. Hanson and Arthur O'Dwyer. uthash: Hash Table for C Structures, 2019. URL https:\/\/troydhanson.github.io\/uthash\/."},{"unstructured":"Hunspell. Hunspell 2019. URL http:\/\/hunspell.github.io\/. Hunspell. Hunspell 2019. URL http:\/\/hunspell.github.io\/.","key":"e_1_3_2_1_23_1"},{"volume-title":"Independent JPEG Group","year":"2019","unstructured":"libjpeg. Independent JPEG Group , 2019 . URL http:\/\/libjpeg.sourceforge.net\/. libjpeg. Independent JPEG Group, 2019. URL http:\/\/libjpeg.sourceforge.net\/.","key":"e_1_3_2_1_24_1"},{"unstructured":"Integrated Performance Primitives Cryptography. Intel 2019. URL https:\/\/github.com\/intel\/ipp-crypto. Integrated Performance Primitives Cryptography. Intel 2019. URL https:\/\/github.com\/intel\/ipp-crypto.","key":"e_1_3_2_1_25_1"},{"unstructured":"SGX Linux Driver. Intel 2019. URL https:\/\/github.com\/intel\/linux-sgx-driver. SGX Linux Driver. Intel 2019. URL https:\/\/github.com\/intel\/linux-sgx-driver.","key":"e_1_3_2_1_26_1"},{"unstructured":"SGX SDK for Linux. Intel 2019. URL https:\/\/github.com\/intel\/linux-sgx. SGX SDK for Linux. Intel 2019. URL https:\/\/github.com\/intel\/linux-sgx.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"ISCA 2015","author":"SGX","year":"2015","unstructured":"SGX Tutorial at ISCA 2015 . Intel Corp. , June 2015 . Ref. #332680-002 https:\/\/software.intel.com\/sites\/default\/files\/332680-002.pdf. SGX Tutorial at ISCA 2015. Intel Corp., June 2015. Ref. #332680-002 https:\/\/software.intel.com\/sites\/default\/files\/332680-002.pdf."},{"unstructured":"Intel 64 and IA-32 Architectures Software Developer's Manual. Intel Corp. May 2019. Ref. #325462-070US. Intel 64 and IA-32 Architectures Software Developer's Manual. Intel Corp. May 2019. Ref. #325462-070US.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","volume-title":"Intel Developer Zone","author":"Johnson Simon","year":"2018","unstructured":"Simon Johnson . Intel SGX and side-channels . Intel Developer Zone , February 2018 . URL https:\/\/software.intel.com\/en-us\/articles\/intel-sgx-and-side-channels. Accessed : 2019-07-29. Simon Johnson. Intel SGX and side-channels. Intel Developer Zone, February 2018. URL https:\/\/software.intel.com\/en-us\/articles\/intel-sgx-and-side-channels. Accessed: 2019-07-29."},{"key":"e_1_3_2_1_31_1","volume-title":"Intel, 2019","author":"Johnson Simon","year":"2019","unstructured":"Simon Johnson . Scaling towards confidential computing . Intel, 2019 . URL https:\/\/systex.ibr.cs.tu-bs.de\/systex19\/slides\/systex19-keynote-simon.pdf. Keynote presentation at SysTEX 2019 . Simon Johnson. Scaling towards confidential computing. Intel, 2019. URL https:\/\/systex.ibr.cs.tu-bs.de\/systex19\/slides\/systex19-keynote-simon.pdf. Keynote presentation at SysTEX 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/268998.266644"},{"key":"e_1_3_2_1_33_1","volume-title":"April","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . Amd memory encryption. White paper , April 2016 . URL https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf. David Kaplan, Jeremy Powell, and Tom Woller. Amd memory encryption. White paper, April 2016. URL https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf."},{"key":"e_1_3_2_1_34_1","volume-title":"IBM","author":"Karnati Pratheek","year":"2018","unstructured":"Pratheek Karnati . Data-in-use protection on IBM Cloud using Intel SGX . IBM , May 2018 . URL https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx. Pratheek Karnati. Data-in-use protection on IBM Cloud using Intel SGX. IBM, May 2018. URL https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1016\/j.cose.2018.12.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_37_1","volume-title":"July","author":"Lee Dayeol","year":"2019","unstructured":"Dayeol Lee , David Kohlbrenner , Shweta Shinde , Dawn Song , and Krste Asanovi\u0107 . Keystone: A framework for architecting TEEs. CoRR, abs\/1907.10119 , July 2019 . URL https:\/\/arxiv.org\/abs\/1907.10119. Dayeol Lee, David Kohlbrenner, Shweta Shinde, Dawn Song, and Krste Asanovi\u0107. Keystone: A framework for architecting TEEs. CoRR, abs\/1907.10119, July 2019. URL https:\/\/arxiv.org\/abs\/1907.10119."},{"key":"e_1_3_2_1_38_1","first-page":"285","volume-title":"2017 USENIX Annual Technical Conference","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind , Christian Priebe , Divya Muthukumaran , Dan O'Keeffe , Pierre-Louis Aublin , Florian Kelbert , Tobias Reiher , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , Christof Fetzer , and Peter Pietzuch . Glamdring : Automatic application partitioning for Intel SGX . In 2017 USENIX Annual Technical Conference , pages 285 -- 298 , Santa Clara, CA , 2017 . ISBN 978-1-931971-38-6. URL https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/lind. Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Christof Fetzer, and Peter Pietzuch. Glamdring: Automatic application partitioning for Intel SGX. In 2017 USENIX Annual Technical Conference, pages 285--298, Santa Clara, CA, 2017. ISBN 978-1-931971-38-6. URL https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/lind."},{"unstructured":"Uwe F. Mayer. BYTE magazine native mode benchmarks. URL https:\/\/www.math.utah.edu\/~mayer\/linux\/bmark.html. Accessed: 2019-11-02. Uwe F. Mayer. BYTE magazine native mode benchmarks. URL https:\/\/www.math.utah.edu\/~mayer\/linux\/bmark.html. Accessed: 2019-11-02.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_41_1","first-page":"1","volume-title":"5th International Workshop on Hardware and Architectural Support for Security and Privacy","author":"McKeen Frank","year":"2016","unstructured":"Frank McKeen , Ilya Alexandrovich , Ittai Anati , Dror Caspi , Simon Johnson , Rebekah Leslie-Hurd , and Carlos V. Rozas . Intel SGX support for dynamic memory management inside an enclave . In 5th International Workshop on Hardware and Architectural Support for Security and Privacy , pages 10: 1 -- 10 :9, 2016 . Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, and Carlos V. Rozas. Intel SGX support for dynamic memory management inside an enclave. In 5th International Workshop on Hardware and Architectural Support for Security and Privacy, pages 10:1--10:9, 2016."},{"unstructured":"Memcached. Memcached 2019. URL http:\/\/memcached.org\/. Memcached. Memcached 2019. URL http:\/\/memcached.org\/.","key":"e_1_3_2_1_42_1"},{"unstructured":"Open Enclave SDK. Microsoft. URL https:\/\/openenclave.io\/. Accessed: 2019-08-16. Open Enclave SDK. Microsoft. URL https:\/\/openenclave.io\/. Accessed: 2019-08-16.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","first-page":"69","volume-title":"International Conference on Cryptographic Hardware and Embedded Systems","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi , Gorka Irazoqui , and Thomas Eisenbarth . Cachezoom : How SGX amplifies the power of cache attacks . In International Conference on Cryptographic Hardware and Embedded Systems , pages 69 -- 90 . Springer International Publishing , 2017 . Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. Cachezoom: How SGX amplifies the power of cache attacks. In International Conference on Cryptographic Hardware and Embedded Systems, pages 69--90. Springer International Publishing, 2017."},{"key":"e_1_3_2_1_45_1","volume-title":"Nadia Heninger, Frank Piessens, and Berk Sunar. CopyCat: Controlled instruction-level attacks on enclaves for maximal key extraction. CoRR, abs\/2002.08437","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi , Jo Van Bulck , Nadia Heninger, Frank Piessens, and Berk Sunar. CopyCat: Controlled instruction-level attacks on enclaves for maximal key extraction. CoRR, abs\/2002.08437 , February 2020 . URL https:\/\/arxiv.org\/abs\/2002.08437. Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. CopyCat: Controlled instruction-level attacks on enclaves for maximal key extraction. CoRR, abs\/2002.08437, February 2020. URL https:\/\/arxiv.org\/abs\/2002.08437."},{"key":"e_1_3_2_1_46_1","first-page":"227","volume-title":"2018 USENIX Annual Technical Conference","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko , Bohdan Trach , Robert Krahn , Mark Silberstein , and Christof Fetzer . Varys : Protecting SGX enclaves from practical side-channel attacks . In 2018 USENIX Annual Technical Conference , pages 227 -- 240 , 2018 . Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. Varys: Protecting SGX enclaves from practical side-channel attacks. In 2018 USENIX Annual Technical Conference, pages 227--240, 2018."},{"key":"e_1_3_2_1_47_1","first-page":"238","volume-title":"EuroSys Conference","author":"Orenbach Meni","year":"2017","unstructured":"Meni Orenbach , Pavel Lifshits , Marina Minkin , and Mark Silberstein . Eleos : Exitless OS services for SGX enclaves . In EuroSys Conference , pages 238 -- 253 , 2017 . Meni Orenbach, Pavel Lifshits, Marina Minkin, and Mark Silberstein. Eleos: Exitless OS services for SGX enclaves. In EuroSys Conference, pages 238--253, 2017."},{"key":"e_1_3_2_1_48_1","first-page":"555 03","volume-title":"2019 USENIX Annual Technical Conference","author":"Orenbach Meni","year":"2019","unstructured":"Meni Orenbach , Yan Michalevsky , Christ of Fetzer , and Mark Silberstein . CoSMIX : A compiler-based system for secure memory instrumentation and execution in enclaves . In 2019 USENIX Annual Technical Conference , pages 555 -- 570 , July 2019 . ISBN 978-1-939133- 03 - 08 . Meni Orenbach, Yan Michalevsky, Christ of Fetzer, and Mark Silberstein. CoSMIX: A compiler-based system for secure memory instrumentation and execution in enclaves. In 2019 USENIX Annual Technical Conference, pages 555--570, July 2019. ISBN 978-1-939133-03-8."},{"key":"e_1_3_2_1_49_1","volume-title":"May","author":"Porter Nelly","year":"2018","unstructured":"Nelly Porter , Jason Garms , and Sergey Simakov . Introducing Asylo: an open-source framework for confidential computing , May 2018 . URL https:\/\/cloud.google.com\/blog\/products\/gcp\/introducing-asylo-an-open-source-framework-for-confidential-computing. Accessed : 2019-07-30. Nelly Porter, Jason Garms, and Sergey Simakov. Introducing Asylo: an open-source framework for confidential computing, May 2018. URL https:\/\/cloud.google.com\/blog\/products\/gcp\/introducing-asylo-an-open-source-framework-for-confidential-computing. Accessed: 2019-07-30."},{"key":"e_1_3_2_1_50_1","volume-title":"August","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe , Divya Muthukumaran , Joshua Lind , Huanzhou Zhu , Shujie Cui , Vasily A. Sartakov , and Peter Pietzuch . SGX-LKL: Securing the host OS interface for trusted execution. CoRR, abs\/1908.11143 , August 2019 . URL https:\/\/arxiv.org\/abs\/1908.11143. Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A. Sartakov, and Peter Pietzuch. SGX-LKL: Securing the host OS interface for trusted execution. CoRR, abs\/1908.11143, August 2019. URL https:\/\/arxiv.org\/abs\/1908.11143."},{"key":"e_1_3_2_1_51_1","first-page":"431","volume-title":"24th USENIX Security Symposium","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . Raccoon : Closing digital side-channels through obfuscated execution . In 24th USENIX Security Symposium , pages 431 -- 446 , August 2015 . ISBN 978-1-931971-232. URL https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane. Ashay Rane, Calvin Lin, and Mohit Tiwari. Raccoon: Closing digital side-channels through obfuscated execution. In 24th USENIX Security Symposium, pages 431--446, August 2015. ISBN 978-1-931971-232. URL https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1109\/HPCA.2007.346181"},{"key":"e_1_3_2_1_53_1","volume-title":"September","author":"Russinovich Mark","year":"2017","unstructured":"Mark Russinovich . Introducing Azure confidential computing , September 2017 . URL https:\/\/azure.microsoft.com\/blog\/introducing-azure-confidential-computing\/. Accessed : 2019-07-30. Mark Russinovich. Introducing Azure confidential computing, September 2017. URL https:\/\/azure.microsoft.com\/blog\/introducing-azure-confidential-computing\/. Accessed: 2019-07-30."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.14722\/ndss.2018.23239"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_56_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. CoRR, abs\/1905.05726","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz , Moritz Lipp , Daniel Moghimi , Jo Van Bulck , Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. CoRR, abs\/1905.05726 , May 2019 . URL https:\/\/arxiv.org\/abs\/1905.05726. Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. CoRR, abs\/1905.05726, May 2019. URL https:\/\/arxiv.org\/abs\/1905.05726."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.14722\/ndss.2017.23037"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.14722\/ndss.2017.23193"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/2897845.2897885"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.14722\/ndss.2017.23500"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/3307650.3322228"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_63_1","volume-title":"December","author":"Strackx Raoul","year":"2017","unstructured":"Raoul Strackx and Frank Piessens . The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks. CoRR, abs\/1712.08519 , December 2017 . URL http:\/\/arxiv.org\/abs\/1712.08519. Raoul Strackx and Frank Piessens. The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks. CoRR, abs\/1712.08519, December 2017. URL http:\/\/arxiv.org\/abs\/1712.08519."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_65_1","first-page":"645","volume-title":"2017 USENIX Annual Technical Conference","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E. Porter , and Mona Vij . Graphene-SGX : A practical library OS for unmodified applications on SGX . In 2017 USENIX Annual Technical Conference , pages 645 -- 658 , 2017 . ISBN 978-1-931971-38-6. URL https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai. Chia-Che Tsai, Donald E. Porter, and Mona Vij. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference, pages 645--658, 2017. ISBN 978-1-931971-38-6. URL https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_67_1","first-page":"1041","volume-title":"26th USENIX Security Symposium","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In 26th USENIX Security Symposium , pages 1041 -- 1056 , 2017 . Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In 26th USENIX Security Symposium, pages 1041--1056, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_68_1","DOI":"10.1109\/MM.2019.2910104"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_70_1","volume-title":"IEEE Symposium on Security and Privacy","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . RIDL : Rogue in-flight data load . In IEEE Symposium on Security and Privacy , May 2019 . Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue in-flight data load. In IEEE Symposium on Security and Privacy, May 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/844128.844146"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_72_1","DOI":"10.1145\/3133956.3134038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1145\/2810103.2813634"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1007\/978-3-319-45744-4_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.1145\/3079856.3080208"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_76_1","DOI":"10.1109\/SP.2015.45"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_77_1","DOI":"10.1145\/1508293.1508297"},{"key":"e_1_3_2_1_78_1","first-page":"283","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica . Opaque : An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation , pages 283 -- 298 , 2017 . URL https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, pages 283--298, 2017. URL https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng."}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"EuroSys '20","name":"EuroSys '20: Fifteenth EuroSys Conference 2020","location":"Heraklion Greece"},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T02:23:57Z","timestamp":1673144637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387541"}},"subtitle":["closing controlled channels with self-paging enclaves"],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":77,"alternative-id":["10.1145\/3342195.3387541","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387541","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}