{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T04:18:52Z","timestamp":1729138732427,"version":"3.27.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607215","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"485-498","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2126-7997","authenticated-orcid":false,"given":"Donghui","family":"Yu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7210-3792","authenticated-orcid":false,"given":"Jianqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0007-9860-760X","authenticated-orcid":false,"given":"Haoran","family":"Fang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-1016-7912","authenticated-orcid":false,"given":"Ya","family":"Fang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6682-2264","authenticated-orcid":false,"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"unstructured":"[1] American Fuzzy Lop 2023. https:\/\/github.com\/google\/AFL.","key":"e_1_3_2_1_1_1"},{"volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI16)","year":"2016","author":"Arnautov Sergei","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O\u2019keeffe, Mark\u00a0L Stillwell, 2016. SCONE: Secure linux containers with intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI16). 689\u2013703.","key":"e_1_3_2_1_2_1"},{"unstructured":"[3] Awesome-SGX-Open-Source 2023. https:\/\/github.com\/Maxul\/Awesome-SGX-Open-Source.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3338906.3340456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2799647"},{"volume-title":"The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"Biondo Andrea","unstructured":"Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th USENIX Security Symposium (USENIX Security 18). 1213\u20131227.","key":"e_1_3_2_1_6_1"},{"unstructured":"[7] C3PO 2023. https:\/\/github.com\/omec-project\/c3po.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2490301.2451145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/EuroSP.2019.00020"},{"volume-title":"30th USENIX Security Symposium (USENIX Security 21)","year":"2021","author":"Chen Zitai","unstructured":"Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio\u00a0D Garcia. 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. In 30th USENIX Security Symposium (USENIX Security 21).","key":"e_1_3_2_1_10_1"},{"volume-title":"TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20)","year":"2020","author":"Cloosters Tobias","unstructured":"Tobias Cloosters, Michael Rodler, and Lucas Davi. 2020. TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20). 841\u2013858.","key":"e_1_3_2_1_11_1"},{"volume-title":"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22)","year":"2022","author":"Cloosters Tobias","unstructured":"Tobias Cloosters, Johannes Willbold, Thorsten Holz, and Lucas Davi. 2022. SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3147\u20133164. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/cloosters","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/3460120.3484821"},{"volume-title":"Emilia: Catching Iago in Legacy Code.","year":"2021","author":"Cui Rongzhen","unstructured":"Rongzhen Cui, Lianying Zhao, and David Lie. 2021. Emilia: Catching Iago in Legacy Code. (2021).","key":"e_1_3_2_1_14_1"},{"volume-title":"Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks.","year":"2018","author":"Dall Fergus","unstructured":"Fergus Dall, Gabrielle De\u00a0Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom. 2018. Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks. (2018).","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3133956.3138824"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3296957.3173204"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.14722\/ndss.2018.23312"},{"volume-title":"SGX-Capsule: A Confidential Execution Engine for Unmodified Libraries on SGX Enclave. In 2021 IEEE International Conference on Cloud Engineering (IC2E). IEEE, 276\u2013277","year":"2021","author":"Hwang Woomin","unstructured":"Woomin Hwang, Chulwoo Lee, and Byungjoon Kim. 2021. SGX-Capsule: A Confidential Execution Engine for Unmodified Libraries on SGX Enclave. In 2021 IEEE International Conference on Cloud Engineering (IC2E). IEEE, 276\u2013277.","key":"e_1_3_2_1_19_1"},{"volume-title":"Intel-SGX SDK","year":"2023","unstructured":"[20] Intel-SGX SDK 2023. https:\/\/github.com\/intel\/linux-sgx.","key":"e_1_3_2_1_20_1"},{"volume-title":"29th USENIX Security Symposium (USENIX Security 20)","year":"2020","author":"Ispoglou Kyriakos","unstructured":"Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. Fuzzgen: Automatic fuzzer generation. In 29th USENIX Security Symposium (USENIX Security 20). 2271\u20132287.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3152701.3152709"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3373376.3378486"},{"unstructured":"[24] Ledger-Bolos 2023. https:\/\/github.com\/LedgerHQ\/bolos-enclave.","key":"e_1_3_2_1_24_1"},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Lee Jaehyuk","unstructured":"Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent\u00a0ByungHoon Kang. 2017. Hacking in darkness: Return-oriented programming against secure enclaves. In 26th USENIX Security Symposium (USENIX Security 17). 523\u2013539.","key":"e_1_3_2_1_25_1"},{"unstructured":"[26] LibFuzzer 2023. https:\/\/llvm.org\/docs\/LibFuzzer.html.","key":"e_1_3_2_1_26_1"},{"unstructured":"[27] mbedtls-SGX 2023. https:\/\/github.com\/bl4ck5un\/mbedtls-SGX.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/3468264.3473932"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/3447852.3458716"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/978-3-319-66787-4_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/SP40000.2020.00057"},{"unstructured":"[32] Plinius 2023. https:\/\/github.com\/anonymous-xh\/plinius.","key":"e_1_3_2_1_32_1"},{"volume-title":"2012 USENIX Annual Technical Conference (USENIXATC12)","year":"2012","author":"Serebryany Konstantin","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. Addresssanitizer: A fast address sanity checker. In 2012 USENIX Annual Technical Conference (USENIXATC12). 309\u2013318.","key":"e_1_3_2_1_33_1"},{"unstructured":"[34] SGX-base-File-Hosting 2023. https:\/\/github.com\/wuliangshun\/SGX-base-File-Hosting.","key":"e_1_3_2_1_34_1"},{"unstructured":"[35] SGX-Based-Mixes 2023. https:\/\/github.com\/oEscal\/sgx-based-mix-networks.","key":"e_1_3_2_1_35_1"},{"unstructured":"[36] SGX-BSM 2023. https:\/\/github.com\/sbellem\/sgx-bsm.","key":"e_1_3_2_1_36_1"},{"unstructured":"[37] SGX-Darknet 2023. https:\/\/github.com\/anonymous-xh\/sgx-dnet.","key":"e_1_3_2_1_37_1"},{"unstructured":"[38] SGX-Dedup 2023. https:\/\/github.com\/jingwei87\/sgxdedup.","key":"e_1_3_2_1_38_1"},{"unstructured":"[39] SGX-Recovery-Extension 2023. https:\/\/github.com\/andrade\/srx.","key":"e_1_3_2_1_39_1"},{"unstructured":"[40] SGX-SQLite 2023. https:\/\/github.com\/yerzhan7\/SGX_SQLite.","key":"e_1_3_2_1_40_1"},{"volume-title":"Automated Vulnerability Finding in SGX Enclave Application","year":"2023","unstructured":"[41] SGXRay: Automated Vulnerability Finding in SGX Enclave Application 2023. https:\/\/github.com\/baidu\/sgxray.","key":"e_1_3_2_1_41_1"},{"unstructured":"[42] ShieldStore 2023. https:\/\/github.com\/cocoppang\/ShieldStore.","key":"e_1_3_2_1_42_1"},{"volume-title":"Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS.","year":"2017","author":"Shinde Shweta","unstructured":"Shweta Shinde, Dat Le\u00a0Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS.","key":"e_1_3_2_1_43_1"},{"volume-title":"Besfs: Mechanized proof of an iago-safe filesystem for enclaves. ArXiv e-prints","year":"2018","author":"Shinde Shweta","unstructured":"Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, and Prateek Saxena. 2018. Besfs: Mechanized proof of an iago-safe filesystem for enclaves. ArXiv e-prints (2018).","key":"e_1_3_2_1_44_1"},{"doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. (2015).","key":"e_1_3_2_1_45_1","DOI":"10.14722\/ndss.2015.23294"},{"doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Audrey Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2016).","key":"e_1_3_2_1_46_1","DOI":"10.1109\/SP.2016.17"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/2810103.2813608"},{"unstructured":"[48] SkSES 2023. https:\/\/github.com\/ndokmai\/sgx-genome-variants-search.","key":"e_1_3_2_1_48_1"},{"unstructured":"[49] STANlite 2023. https:\/\/github.com\/ibr-ds\/STANlite.","key":"e_1_3_2_1_49_1"},{"unstructured":"[50] StealthDB 2023. https:\/\/github.com\/cryptograph\/stealthdb.","key":"e_1_3_2_1_50_1"},{"volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution.","year":"2016","author":"Stephens Nick","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Audrey Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. (2016).","key":"e_1_3_2_1_51_1"},{"unstructured":"[52] Tensorflow-Lite 2023. https:\/\/github.com\/Jumpst3r\/tensorflow-lite-sgx.","key":"e_1_3_2_1_52_1"},{"unstructured":"[53] The LLVM Compiler Infrastructure 2023. https:\/\/llvm.org\/.","key":"e_1_3_2_1_53_1"},{"unstructured":"[54] TresorSGX 2023. https:\/\/github.com\/ayeks\/TresorSGX.","key":"e_1_3_2_1_54_1"},{"unstructured":"[55] TrustInSoft 2023. https:\/\/trust-in-soft.com\/.","key":"e_1_3_2_1_55_1"},{"volume-title":"2017 USENIX Annual Technical Conference (USENIXATC17)","year":"2017","author":"Tsai Chia-Che","unstructured":"Chia-Che Tsai, Donald\u00a0E Porter, and Mona Vij. 2017. Graphene-sgx: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIXATC17). 645\u2013658.","key":"e_1_3_2_1_56_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1145\/3319535.3363206"},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Van\u00a0Bulck Jo","unstructured":"Jo Van\u00a0Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In 26th USENIX Security Symposium (USENIX Security 17). 1041\u20131056.","key":"e_1_3_2_1_58_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/3319535.3354241"},{"unstructured":"[60] WolfSSL-SGX-Example 2023. https:\/\/github.com\/wolfSSL\/wolfssl-examples.","key":"e_1_3_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1109\/SP.2015.45"},{"volume-title":"IntelliGen: Automatic Driver Synthesis for Fuzz Testing. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 318\u2013327","year":"2021","author":"Zhang Mingrui","unstructured":"Mingrui Zhang, Jianzhong Liu, Fuchen Ma, Huafeng Zhang, and Yu Jiang. 2021. IntelliGen: Automatic Driver Synthesis for Fuzz Testing. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 318\u2013327.","key":"e_1_3_2_1_62_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.1145\/3342195.3387536"}],"event":{"acronym":"RAID 2023","name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:34:58Z","timestamp":1729074898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":63,"alternative-id":["10.1145\/3607199.3607215","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607215","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}