{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:03:24Z","timestamp":1773277404653,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030017002","type":"print"},{"value":"9783030017019","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_25","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"451-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave"],"prefix":"10.1007","author":[{"given":"Weizhong","family":"Qiang","sequence":"first","affiliation":[]},{"given":"Zezhao","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"25_CR1","unstructured":"ApacheBench (2018). https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"25_CR2","unstructured":"Arnautov, S., et al.: SCONE: secure Linux containers with Intel SGX. In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, pp. 689\u2013703. USENIX Association (2016)"},{"key":"25_CR3","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, pp. 267\u2013283. USENIX Association (2014)"},{"key":"25_CR4","unstructured":"Binaryen (2018). https:\/\/github.com\/WebAssembly\/binaryen"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Brenner, S., et al.: SecureKeeper: confidential ZooKeeper using Intel SGX. In: Proceedings of the 17th International Middleware Conference, pp. 1\u201313. ACM (2016)","DOI":"10.1145\/2988336.2988350"},{"key":"25_CR6","unstructured":"Brotli (2018). https:\/\/github.com\/google\/brotli\/"},{"key":"25_CR7","unstructured":"Buyya, R., et al.: A manifesto for future generation cloud computing: research directions for the next decade. CoRR abs\/1711.09123 (2017)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Shacham, H.: Iago attacks: why the system call API is a bad untrusted RPC interface. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 253\u2013264. ACM (2013)","DOI":"10.1145\/2451116.2451145"},{"key":"25_CR9","unstructured":"Emscripten (2018). https:\/\/github.com\/kripken\/emscripten"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1007\/978-3-642-32009-5_49","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850\u2013867. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_49"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: Inktag: secure applications on an untrusted operating system. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 265\u2013278. ACM (2013)","DOI":"10.1145\/2451116.2451146"},{"key":"25_CR13","unstructured":"Hunt, T., Zhu, Z., Xu, Y., Peter, S., Witchel, E.: Ryoan: a distributed sandbox for untrusted computation on secret data. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, pp. 533\u2013549. USENIX Association (2016)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Jana, S., Porter, D.E., Shmatikov, V.: TxBox: building secure, efficient sandboxes with system transactions. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 329\u2013344. IEEE (2011)","DOI":"10.1109\/SP.2011.33"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Karande, V., Bauman, E., Lin, Z., Khan, L.: SGX-log: securing system logs with SGX. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 19\u201330. ACM (2017)","DOI":"10.1145\/3052973.3053034"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Kwon, Y., Dunn, A.M., Lee, M.Z., Hofmann, O.S., Xu, Y., Witchel, E.: Sego: pervasive trusted metadata for efficiently verified untrusted system services. In: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 277\u2013290. ACM (2016)","DOI":"10.1145\/2872362.2872372"},{"key":"25_CR17","unstructured":"Lee, S., Shih, M.W., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In: Proceedings of the 26th USENIX Security Symposium, pp. 557\u2013574. USENIX Association (2017)"},{"key":"25_CR18","unstructured":"Li, Y., McCune, J., Newsome, J., Perrig, A., Baker, B., Drewry, W.: MiniBox: a two-way sandbox for x86 native code. In: Proceedings of the 2014 USENIX Annual Technical Conference, pp. 409\u2013420. USENIX Association (2014)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"McCune, J.M., et al.: TrustVisor: efficient TCB reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 143\u2013158. IEEE (2010)","DOI":"10.1109\/SP.2010.17"},{"key":"25_CR20","unstructured":"OpenCV (2018). https:\/\/opencv.org\/"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Pires, R., Pasin, M., Felber, P., Fetzer, C.: Secure content-based routing using Intel software guard extensions. In: Proceedings of the 17th International Middleware Conference, pp. 1\u201310. ACM (2016)","DOI":"10.1145\/2988336.2988346"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 38\u201354. IEEE (2015)","DOI":"10.1109\/SP.2015.10"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Seo, J., et al.: SGX-shield: enabling address space layout randomization for SGX programs. In: Proceedings of the 2017 Annual Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23037"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Shih, M.W., Kumar, M., Kim, T., Gavrilovska, A.: S-NFV: securing NFV states by using SGX. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, pp. 45\u201348. ACM (2016)","DOI":"10.1145\/2876019.2876032"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Shih, M.W., Lee, S., Kim, T., Peinado, M.: T-SGX: eradicating controlled-channel attacks against enclave programs. In: Proceedings of the 2017 Annual Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23193"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Shinde, S., Chua, Z.L., Narayanan, V., Saxena, P.: Preventing page faults from telling your secrets. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 317\u2013328. ACM (2016)","DOI":"10.1145\/2897845.2897885"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Shinde, S., Le Tien, D., Tople, S., Saxena, P.: Panoply: low-TCB Linux applications with SGX enclaves. In: Proceedings of the 2017 Annual Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23500"},{"key":"25_CR28","unstructured":"Squash-benchmark (2018). http:\/\/quixdb.github.io\/squash-benchmark\/"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Tetali, S.D., Lesani, M., Majumdar, R., Millstein, T.: MrCrypt: static analysis for secure cloud computations. In: Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages, and Applications, pp. 271\u2013286. ACM (2013)","DOI":"10.1145\/2509136.2509554"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Tian, H., Zhang, Y., Xing, C., Yan, S.: SGXKernel: a library operating system optimized for Intel SGX. In: Proceedings of the Computing Frontiers Conference, pp. 35\u201344. ACM (2017)","DOI":"10.1145\/3075564.3075572"},{"key":"25_CR31","unstructured":"Tsai, C.C., Porter, D.E., Vij, M.: Graphene-SGX: a practical library OS for unmodified applications on SGX. In: Proceedings of the 2017 USENIX Annual Technical Conference, pp. 645\u2013658. USENIX Association (2017)"},{"key":"25_CR32","unstructured":"Van Bulck, J., Weichbrodt, N., Kapitza, R., Piessens, F., Strackx, R.: Telling your secrets without page faults: stealthy page table-based attacks on enclaved execution. In: Proceedings of the 26th USENIX Security Symposium, pp. 1041\u20131056. USENIX Association (2017)"},{"key":"25_CR33","unstructured":"WebAssembly (2018). http:\/\/webassembly.org\/"},{"key":"25_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-319-45744-4_22","volume-title":"Computer Security \u2013 ESORICS 2016","author":"N Weichbrodt","year":"2016","unstructured":"Weichbrodt, N., Kurmus, A., Pietzuch, P., Kapitza, R.: AsyncShock: exploiting synchronisation bugs in Intel SGX enclaves. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 440\u2013457. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45744-4_22"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Yee, B., et al.: Native client: a sandbox for portable, untrusted x86 native code. In: Proceedings of the 2009 IEEE Symposium on Security and Privacy, pp. 79\u201393. IEEE (2009)","DOI":"10.1109\/SP.2009.25"},{"key":"25_CR36","unstructured":"Zheng, W., Dave, A., Beekman, J.G., Popa, R.A., Gonzalez, J.E., Stoica, I.: Opaque: an oblivious and encrypted distributed analytics platform. In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, pp. 283\u2013298. USENIX Association (2017)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:19:45Z","timestamp":1573625985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}