{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:12:45Z","timestamp":1775041965450,"version":"3.50.1"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T00:00:00Z","timestamp":1609372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T00:00:00Z","timestamp":1609372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11704-019-9096-y","type":"journal-article","created":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T00:03:56Z","timestamp":1609373036000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["A survey of Intel SGX and its applications"],"prefix":"10.1007","volume":"15","author":[{"given":"Wei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaoxue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,31]]},"reference":[{"key":"9096_CR1","doi-asserted-by":"crossref","unstructured":"Lou Y, Wang W. The research of trusted technology under cloud environment. In: Proceedings of International Conference on Information Science and Cloud Computing Companion. 2013, 231\u2013235","DOI":"10.1109\/ISCC-C.2013.144"},{"issue":"11","key":"9096_CR2","first-page":"2417","volume":"16","author":"C Y Liu","year":"2004","unstructured":"Liu C Y, Feng M, Dai X J, Li D Y. A new algorithm of backward cloud. Acta Simulata Systematica Sinica, 2004, 16(11): 2417\u20132420","journal-title":"Acta Simulata Systematica Sinica"},{"issue":"7","key":"9096_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1364782.1364786","volume":"51","author":"B Hayes","year":"2008","unstructured":"Hayes B. Cloud computing. Communications of the ACM, 2008, 51(7): 9\u201311","journal-title":"Communications of the ACM"},{"key":"9096_CR4","doi-asserted-by":"crossref","unstructured":"Futral W, Greene J. Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters. Apress, 2013","DOI":"10.1007\/978-1-4302-6149-0"},{"key":"9096_CR5","doi-asserted-by":"crossref","unstructured":"Ning Z, Zhang F, Shi W. Position paper: challenges towards securing hardware-assisted execution environments. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2017","DOI":"10.1145\/3092627.3092633"},{"key":"9096_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.knosys.2011.10.016","volume":"28","author":"Z Pei","year":"2012","unstructured":"Pei Z, Ruan D, Liu J, Xu Y. A linguistic aggregation operator with three kinds of weights for nuclear safeguards evaluation. Knowledge-Based Systems, 2012, 28: 19\u201326","journal-title":"Knowledge-Based Systems"},{"issue":"1","key":"9096_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.neucom.2011.05.029","volume":"78","author":"D Meng","year":"2012","unstructured":"Meng D, Pei Z. Extracting linguistic rules from data sets using fuzzy logic and genetic algorithms. Neurocomputing, 2012, 78(1): 48\u201354","journal-title":"Neurocomputing"},{"issue":"3","key":"9096_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann A, Peinado M, Hunt G. Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS), 2015, 33(3): 8","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"9096_CR9","unstructured":"Tsai C C, Porter D E, Vij M. Graphene-SGX: a practical library OS for unmodified applications on SGX. In: Proceedings of USENIX Annual Technical Conference. 2017, 645\u2013658"},{"key":"9096_CR10","unstructured":"Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O\u2019keeffe D, Stillwell M. SCONE: secure linux containers with Intel SGX. In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 2016, 689\u2013703"},{"key":"9096_CR11","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried J, Eckert M, Schinzel S, M\u00fcller T. Cache attacks on Intel SGX. In: Proceedings of the 10th European Workshop on Systems Security. 2017","DOI":"10.1145\/3065913.3065915"},{"key":"9096_CR12","doi-asserted-by":"crossref","unstructured":"McKeen F, Alexandrovich I, Anati I, Caspi D, Johnson S, Leslie H R, Rozas C. Intel\u00ae software guard extensions (intel\u00ae sgx) support for dynamic memory management inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2016","DOI":"10.1145\/2948618.2954331"},{"key":"9096_CR13","doi-asserted-by":"crossref","unstructured":"Xing B C, Shanahan M, Leslie H R. Intel\u00ae software guard extensions (Intel\u00ae SGX) software support for dynamic memory allocation inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2016","DOI":"10.1145\/2948618.2954330"},{"key":"9096_CR14","doi-asserted-by":"crossref","unstructured":"Schuster F, Costa M, Fournet C, Gkantsidis C, Peinado M, Mainar R G, Russinovich M. VC3: trustworthy data analytics in the cloud using SGX. In: Proceedings of IEEE Symposium on Security and Privacy. 2015, 38\u201354","DOI":"10.1109\/SP.2015.10"},{"key":"9096_CR15","doi-asserted-by":"crossref","unstructured":"Shepherd C, Arfaoui G, Gurulian I, Lee R, Markantonakis K, Akram R, Sauveron D, Conchon E. Secure and trusted execution: past, present and future \u2014 a critical review in the context of the internet of things and cyberphysical systems. In: Proceedings of IEEE Trustcom\/BigDataSE\/ISPA. 2016, 168\u2013177","DOI":"10.1109\/TrustCom.2016.0060"},{"issue":"1","key":"9096_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TCAD.2017.2750067","volume":"37","author":"J Wang","year":"2018","unstructured":"Wang J, Hong Z, Zhang Y, Jin Y. Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 37(1): 88\u201396","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"9096_CR17","doi-asserted-by":"crossref","unstructured":"Hoekstra M, Lai R, Pappachan P, Phegade V, Del Cuvillo J. Using innovative instructions to create trustworthy software solutions. HASP\u00ae ISCA, 2013, 11","DOI":"10.1145\/2487726.2488370"},{"key":"9096_CR18","doi-asserted-by":"crossref","unstructured":"Ngabonziza B, Martin D, Bailey A, Cho H, Martin S. Trustzone explained: architectural features and use cases. In: Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing. 2016, 445\u2013451","DOI":"10.1109\/CIC.2016.065"},{"key":"9096_CR19","unstructured":"Platform G. Global platform made simple guide: trusted execution environment (tee) guide. Derniere Visite, 2013"},{"key":"9096_CR20","doi-asserted-by":"crossref","unstructured":"Kobayashi T, Sasaki T, Jada A, Asoni D E, Perrig A. SAFES: sand-boxed architecture for frequent environment self-measurement. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution. 2018, 37\u201341","DOI":"10.1145\/3268935.3268939"},{"key":"9096_CR21","unstructured":"Du Z H, Ying Z, Ma Z, Mai Y, Wang P, Liu J, Fang J. Secure encrypted virtualization is unsecure. 2017, arXiv preprint arXiv:1712.05090"},{"key":"9096_CR22","doi-asserted-by":"crossref","unstructured":"Mofrad S, Zhang F, Lu S, Shi W. A comparison study of intel SGX and AMD memory encryption technology In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy. 2018","DOI":"10.1145\/3214292.3214301"},{"issue":"5","key":"9096_CR23","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1109\/TNET.2018.2868054","volume":"26","author":"S Kim","year":"2018","unstructured":"Kim S, Han J, Ha J, Kim T, Han D. SGX-Tor: a secure and practical tor anonymity network with SGX enclaves. IEEE\/ACM Transactions on Networking, 2018, 26(5): 2174\u20132187","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9096_CR24","unstructured":"Fisch B, Vinayagamurthy D, Boneh D, Gorbunov S. Iron: functional encryption using Intel SGX. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2017, 765\u2013782"},{"key":"9096_CR25","doi-asserted-by":"crossref","unstructured":"Tychalas D, Tsoutsos N G, Maniatakos M. Sgxcrypter: IP protection for portable executables using Intel\u2019s SGX technology. In: Proceedings of the 22nd Asia and South Pacific Design Automation Conference. 2017, 354\u2013359","DOI":"10.1109\/ASPDAC.2017.7858348"},{"key":"9096_CR26","doi-asserted-by":"crossref","unstructured":"Atamli-Reineh A, Martin A. Securing application with software partitioning: a case study using SGX. In: Proceedings of International Conference on Security and Privacy in Communication Systems. 2015, 605\u2013621","DOI":"10.1007\/978-3-319-28865-9_40"},{"key":"9096_CR27","unstructured":"Lind J, Priebe C, Muthukumaran D, O\u2019Keeffe D, Aublin P L, Kelbert F, Reiher T, Goltzsche D, Eyers D, Kapitza R. Glamdring: automatic application partitioning for Intel SGX. In: Proceedings of USENIX Annual Technical Conference. 2017, 285\u2013298"},{"key":"9096_CR28","doi-asserted-by":"crossref","unstructured":"Bauman E, Lin Z. A case for protecting computer games with SGX. In: Proceedings of the 1st Workshop on System Software for Trusted Execution. 2016, 1\u20136","DOI":"10.1145\/3007788.3007792"},{"key":"9096_CR29","doi-asserted-by":"crossref","unstructured":"Beekman J G, Manferdelli J L, Wagner D. Attestation transparency: building secure internet services for legacy clients. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016, 687\u2013698","DOI":"10.1145\/2897845.2897895"},{"key":"9096_CR30","unstructured":"Manferdelli J, Roeder T, Schneider F. The cloudproxy tao for trusted computing. Technical Rep. UCB\/EECS-2013-135, 2013"},{"key":"9096_CR31","doi-asserted-by":"crossref","unstructured":"Behl J, Distler T, Kapitza R. Hybrids on steroids: SGX-based high performance BFT. In: Proceedings of European Conference on Computer Systems. 2017, 222\u2013237","DOI":"10.1145\/3064176.3064213"},{"key":"9096_CR32","doi-asserted-by":"crossref","unstructured":"Fuhry B, Bahmani R, Brasser F, Hahn F, Kerschbaum F, Sadeghi A R. HardIDX: practical and secure index with SGX. In: Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. 2017, 386\u2013408","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"9096_CR33","doi-asserted-by":"crossref","unstructured":"Priebe C, Vaswani K, Costa M. EnclaveDB: a secure database using SGX. In: Proceedings of IEEE Symposium on Security and Privacy. 2018, 264\u2013278","DOI":"10.1109\/SP.2018.00025"},{"key":"9096_CR34","doi-asserted-by":"crossref","unstructured":"Peters T, Lai R, Varadarajan S, Pappachan P, Kotz D. BASTION-SGX: bluetooth and architectural support for trusted I\/O on SGX. In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy. 2018, 1\u20139","DOI":"10.1145\/3214292.3214295"},{"key":"9096_CR35","doi-asserted-by":"crossref","unstructured":"Yoo S, Kim H, Kim J. Secure compute-VM: secure big data processing with SGX and compute accelerators. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution. 2018, 34\u201336","DOI":"10.1145\/3268935.3268945"},{"key":"9096_CR36","unstructured":"Swami Y. Intel SGX remote attestation is not sufficient. IACR, Cryptology ePrint Archive, 2017"},{"key":"9096_CR37","doi-asserted-by":"crossref","unstructured":"Sfyrakis I, Gross T. UniGuard: protecting unikernels using Intel SGX. In: Proceedings of IEEE International Conference on Cloud Engineering. 2018, 99\u2013105","DOI":"10.1109\/IC2E.2018.00032"},{"key":"9096_CR38","doi-asserted-by":"crossref","unstructured":"Gu J, Hua Z, Xia Y, Chen H, Zang B, Guan H, Li J. Secure live migration of SGX enclaves on untrusted cloud. In: Proceedings of the 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 2017, 225\u2013236","DOI":"10.1109\/DSN.2017.37"},{"issue":"2","key":"9096_CR39","first-page":"48","volume":"10","author":"F Chen","year":"2017","unstructured":"Chen F, Wang C, Dai W, Jiang X, Mohammed N, Al Aziz M M, Sadat M N, Sahinalp C, Lauter K, Wang S. PRESAGE: privacy-preserving genetic testing via software guard extension. BMC Medical Genomics, 2017, 10(2): 48","journal-title":"BMC Medical Genomics"},{"key":"9096_CR40","doi-asserted-by":"crossref","unstructured":"Kelbert F, Gregor F, Pires R, K\u00f6psell S, Pasin M, Havet A, Schiavoni V, Felber P, Fetzer C, Pietzuch P. SecureCloud: secure big data processing in untrusted clouds. In: Proceedings of the Conference on Design, Automation & Test in Europe. 2017, 282\u2013285","DOI":"10.23919\/DATE.2017.7926999"},{"issue":"1","key":"9096_CR41","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13174-018-0078-3","volume":"9","author":"L V Silva","year":"2018","unstructured":"Silva L V, Barbosa P, Marinho R, Brito A. Security and privacy aware data aggregation on cloud computing. Journal of Internet Services and Applications, 2018, 9(1): 6","journal-title":"Journal of Internet Services and Applications"},{"key":"9096_CR42","doi-asserted-by":"crossref","unstructured":"Coughlin M, Keller E, Wustrow E. Trusted click: overcoming security issues of NFV in the cloud. In: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. 2017, 31\u201336","DOI":"10.1145\/3040992.3040994"},{"key":"9096_CR43","doi-asserted-by":"crossref","unstructured":"Chakrabarti S, Leslie-Hurd R, Vij M, McKeen F, Rozas C, Caspi D, Alexandrovich I, Anati I. Intel\u00ae software guard extensions (Intel\u00ae SGX) architecture for oversubscription of secure memory in a virtualized environment. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2017","DOI":"10.1145\/3092627.3092634"},{"key":"9096_CR44","doi-asserted-by":"crossref","unstructured":"Alansari S, Paci F, Sassone V. A distributed access control system for cloud federations. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems. 2017, 2131\u20132136","DOI":"10.1109\/ICDCS.2017.241"},{"key":"9096_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen H, Ganapathy V. EnGarde: mutually-trusted inspection of SGX enclaves. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems. 2017, 2458\u20132465","DOI":"10.1109\/ICDCS.2017.35"},{"key":"9096_CR46","doi-asserted-by":"crossref","unstructured":"Bahmani R, Barbosa M, Brasser F, Portela B, Sadeghi A R, Scerri G, Warinschi B. Secure multiparty computation from SGX. In: Proceedings of International Conference on Financial Cryptography and Data Security. 2017, 477\u2013497","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"9096_CR47","doi-asserted-by":"crossref","unstructured":"Brekalo H, Strackx R, Piessens F Mitigating password database breaches with Intel SGX. In: Proceedings of the 1st Workshop on System Software for Trusted Execution. 2016","DOI":"10.1145\/3007788.3007789"},{"key":"9096_CR48","doi-asserted-by":"crossref","unstructured":"Bhardwaj K, Shih M W, Agarwal P, Gavrilovska A, Kim T, Schwan K. Fast, scalable and secure onloading of edge functions using airbox. In: Proceedings of IEEE\/ACM Symposium on Edge Computing. 2016, 14\u201327","DOI":"10.1109\/SEC.2016.15"},{"key":"9096_CR49","doi-asserted-by":"crossref","unstructured":"Dang H, Purwanto E, Chang E C. Proofs of data residency: checking whether your cloud files have been relocated. In: Proceedings of the ACM on Asia Conference on Computer and Communications Security. 2017, 408\u2013422","DOI":"10.1145\/3052973.3053016"},{"key":"9096_CR50","doi-asserted-by":"crossref","unstructured":"Lie D, Maniatis P. Glimmers: resolving the privacy\/trust quagmire. In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems. 2017, 94\u201399","DOI":"10.1145\/3102980.3102996"},{"key":"9096_CR51","unstructured":"Martin A, Britoy A, Fetzer C. Elastic and secure energy forecasting in cloud environments. 2017, arXiv preprint arXiv:1705.06453"},{"key":"9096_CR52","unstructured":"Duan H, Yuan X, Wang C. Lightbox: SGX-assisted secure network functions at near-native speed. 2017, arXiv preprint arXiv:1706.06261"},{"key":"9096_CR53","doi-asserted-by":"crossref","unstructured":"Han J, Kim S, Ha J, Han D. SGX-Box: enabling visibility on encrypted traffic using a secure middlebox module. In: Proceedings of the 1st Asia-Pacific Workshop on Networking. 2017, 99\u2013105","DOI":"10.1145\/3106989.3106994"},{"key":"9096_CR54","doi-asserted-by":"crossref","unstructured":"Barbosa M, Portela B, Scerri G, Warinschi B. Foundations of hardware-based attested computation and application to SGX. In: Proceedings of IEEE European Symposium on Security and Privacy. 2016, 245\u2013260","DOI":"10.1109\/EuroSP.2016.28"},{"issue":"5","key":"9096_CR55","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2677046.2677048","volume":"44","author":"S E Coull","year":"2014","unstructured":"Coull S E, Dyer K P. Traffic analysis of encrypted messaging services: apple imessage and beyond. ACM SIGCOMM Computer Communication Review, 2014, 44(5): 5\u201311","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"9096_CR56","unstructured":"Van B J, Weichbrodt N, Kapitza R, Piessens F, Strackx R. Telling your secrets without page faults: stealthy page table-based attacks on enclaved execution. In: Proceedings of the 26th USENIX Security Symposium. 2017, 1041\u20131056"},{"key":"9096_CR57","doi-asserted-by":"crossref","unstructured":"Wang W, Chen G, Pan X, Zhang Y, Wang X, Bindschaedler V, Tang H, Gunter C A. Leaky cauldron on the dark land: understanding memory side-channel hazards in SGX. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2017, 2421\u20132434","DOI":"10.1145\/3133956.3134038"},{"key":"9096_CR58","doi-asserted-by":"crossref","unstructured":"Chen S, Zhang X, Reiter M K, Zhang Y. Detecting privileged side-channel attacks in shielded execution with Deja Vu. In: Proceedings of the ACM on Asia Conference on Computer and Communications Security. 2017, 7\u201318","DOI":"10.1145\/3052973.3053007"},{"key":"9096_CR59","doi-asserted-by":"crossref","unstructured":"Schwarz M, Weiser S, Gruss D, Maurice C, Mangard S. Malware guard extension: using SGX to conceal cache attacks. In: Proceedings of International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2017, 3\u201324","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"9096_CR60","doi-asserted-by":"crossref","unstructured":"Moghimi A, Irazoqui G, Eisenbarth T. CacheZoom: how SGX amplifies the power of cache attacks. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 69\u201390","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"9096_CR61","doi-asserted-by":"crossref","unstructured":"Xu Y, Cui W, Peinado M. Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: Proceedings of IEEE Symposium on Security and Privacy. 2015, 640\u2013656","DOI":"10.1109\/SP.2015.45"},{"key":"9096_CR62","doi-asserted-by":"crossref","unstructured":"Shinde S, Chua Z L, Narayanan V Saxena P. Preventing page faults from telling your secrets. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016, 317\u2013328","DOI":"10.1145\/2897845.2897885"},{"issue":"086","key":"9096_CR63","first-page":"1","volume":"2016","author":"V Costan","year":"2016","unstructured":"Costan V, Devadas S. Intel SGX explained. IACR, Cryptology ePrint Archive, 2016, 2016(086): 1\u2013118","journal-title":"IACR, Cryptology ePrint Archive"},{"key":"9096_CR64","unstructured":"Lee S, Shih M W, Gera P, Kim T, Kim H, Peinado M. Inferring finegrained control flow inside SGX enclaves with branch shadowing. In: Proceedings of the 26th USENIX Security Symposium. 2017, 16\u201318"},{"key":"9096_CR65","unstructured":"Chen G, Chen S, Yuan X, Zhang Y, Lai T H. SgxPectre attacks: leaking enclave secrets via speculative execution. 2018, arXiv preprint arXiv:1802.09085"},{"key":"9096_CR66","unstructured":"Van B J, Minkin M, Weisse O, Genkin D, Kasikci B, Piessens F, Silberstein M, Wenisch T F, Yarom Y, Strackx R. Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In: Proceedings of the 27th USENIX Security Symposium. 2018"},{"key":"9096_CR67","unstructured":"Weisse O, Van B J, Minkin M, Genkin D, Kasikci B, Piessens F, Silberstein M, Strackx R, Wenisch T F, Yarom Y. Foreshadow-NG: breaking the virtual memory abstraction with transient out-of-order execution. Technical Report, 2018"},{"key":"9096_CR68","doi-asserted-by":"crossref","unstructured":"Weichbrodt N, Kurmus A, Pietzuch P, Kapitza R. AsyncShock: exploiting synchronisation bugs in Intel SGX enclaves. In: Proceedings of European Symposium on Research in Computer Security. 2016, 440\u2013457","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"9096_CR69","unstructured":"Lee J, Jang J, Jang Y, Kwak N, Choi Y, Choi C, Kim T, Peinado M, Kang B B. Hacking in darkness: return-oriented programming against secure enclaves. In: Proceedings of USENIX Security Symposium. 2017, 523\u2013539"},{"key":"9096_CR70","unstructured":"Biondo A, Conti M, Davi L, Frassetto T, Sadeghi A R. The guard\u2019s dilemma: efficient code-reuse attacks against Intel SGX. In: Proceedings of the 27th USENIX Security Symposium. 2018, 1213\u20131227"},{"key":"9096_CR71","doi-asserted-by":"crossref","unstructured":"Seo J, Lee B, Kim S M, Shih M W, Shin I, Han D, Kim T. SGX-shield: enabling address space layout randomization for SGX programs. In: Proceedings of Network and Distributed System Security Symposium (NDSS). 2017","DOI":"10.14722\/ndss.2017.23037"},{"key":"9096_CR72","doi-asserted-by":"crossref","unstructured":"Sinha R, Rajamani S, Seshia S, Vaswani K. Moat: verifying confidentiality of enclave programs. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015, 1169\u20131184","DOI":"10.1145\/2810103.2813608"},{"key":"9096_CR73","doi-asserted-by":"crossref","unstructured":"Buhren R, Hetzelt F, Pirnay N. On the detectability of control flow using memory access patterns. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution. 2018, 48\u201353","DOI":"10.1145\/3268935.3268941"},{"key":"9096_CR74","doi-asserted-by":"crossref","unstructured":"Chandra S, Karande V, Lin Z, Khan L, Kantarcioglu M, Thuraisingham B. Securing data analytics on sgx with randomization. In: Proceedings of European Symposium on Research in Computer Security. 2017, 352\u2013369","DOI":"10.1007\/978-3-319-66402-6_21"},{"key":"9096_CR75","unstructured":"Strackx R, Piessens F. Ariadne: a minimal approach to state continuity. In: Proceedings of the 25th USENIX Security Symposium. 2016, 875\u2013892"},{"key":"9096_CR76","unstructured":"Costan V, Lebedev I A, Devadas S. Sanctum: minimal hardware extensions for strong software isolation. In: Proceedings of the USENIX Security Symposium. 2016, 857\u2013874"},{"key":"9096_CR77","doi-asserted-by":"crossref","unstructured":"Sasy S, Gorbunov S, Fletcher C W. ZeroTrace: oblivious memory primitives from Intel SGX. In: Proceedings of Symposium on Network and Distributed System Security. 2017","DOI":"10.14722\/ndss.2018.23239"},{"key":"9096_CR78","doi-asserted-by":"crossref","unstructured":"V\u00f6lp M, Lackorzynski A, Decouchant J, Rahli V, Rocha F, Esteves V P. Avoiding leakage and synchronization attacks through enclave-side preemption control. In: Proceedings of the 1st Workshop on System Software for Trusted Execution. 2016, 1\u20136","DOI":"10.1145\/3007788.3007794"},{"key":"9096_CR79","doi-asserted-by":"crossref","unstructured":"Weiser S, Werner M. SGXIO: generic trusted I\/O path for Intel SGX. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy. 2017, 261\u2013268","DOI":"10.1145\/3029806.3029822"},{"key":"9096_CR80","doi-asserted-by":"crossref","unstructured":"Strackx R, Piessens F. Developing secure SGX enclaves: new challenges on the horizon. In: Proceedings of the 1st Workshop on System Software for Trusted Execution. 2016","DOI":"10.1145\/3007788.3007791"},{"key":"9096_CR81","doi-asserted-by":"crossref","unstructured":"Boneh D, Gueron S. Surnaming schemes, fast verification, and applications to SGX technology. In: Proceedings of Cryptographers\u2019 Track at the RSA Conference. 2017, 149\u2013164","DOI":"10.1007\/978-3-319-52153-4_9"},{"issue":"2","key":"9096_CR82","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/3140659.3080208","volume":"45","author":"O Weisse","year":"2017","unstructured":"Weisse O, Bertacco V, Austin T. Regaining lost cycles with HotCalls: a fast interface for SGX secure enclaves. ACM SIGARCH Computer Architecture News, 2017, 45(2): 81\u201393","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"9096_CR83","doi-asserted-by":"crossref","unstructured":"Brandenburger M, Cachin C, Lorenz M, Kapitza R. Rollback and forking detection for trusted execution environments using lightweight collective memory. In: Proceedings of the 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 2017, 157\u2013168","DOI":"10.1109\/DSN.2017.45"},{"key":"9096_CR84","doi-asserted-by":"crossref","unstructured":"Tian H, Zhang Q, Yan S, Rudnitsky A, Shacham L, Yariv R, Milshten N. Switchless calls made practical in Intel SGX. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution. 2018, 22\u201327","DOI":"10.1145\/3268935.3268942"},{"key":"9096_CR85","doi-asserted-by":"crossref","unstructured":"Brenner S, Behlendorf M, Kapitza R. Trusted execution, and the impact of security on performance. In: Proceedings of the 3rd Workshop on System Software for Trusted Execution. 2018, 28\u201333","DOI":"10.1145\/3268935.3268943"},{"key":"9096_CR86","doi-asserted-by":"crossref","unstructured":"Tamrakar S, Liu J, Paverd A, Ekberg J E, Pinkas B, Asokan N. The circle game: scalable private membership test using trusted hardware. In: Proceedings of ACM on Asia Conference on Computer and Communications Security. 2017, 31\u201344","DOI":"10.1145\/3052973.3053006"},{"issue":"9","key":"9096_CR87","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J H Saltzer","year":"1975","unstructured":"Saltzer J H, Schroeder M D. The protection of information in computer systems. Proceedings of the IEEE, 1975, 63(9): 1278\u20131308","journal-title":"Proceedings of the IEEE"},{"key":"9096_CR88","doi-asserted-by":"crossref","unstructured":"Pirker M, Slamanig D. A framework for privacy-preserving mobile payment on security enhanced ARM TrustZone platforms. In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2012, 1155\u20131160","DOI":"10.1109\/TrustCom.2012.28"},{"key":"9096_CR89","unstructured":"Smalley S, Craig R. Security enhanced (SE) Android: bring flexible MAC to Android. In: Proceedings of the 20th Annual Network and Distributed System Symposium. 2013, 20\u201338"},{"key":"9096_CR90","doi-asserted-by":"crossref","unstructured":"Zheng C. Overview of security Enhanced Android\u2019s security architecture. In: Proceedings of the 2nd International Conference on Teaching and Computational Science. 2014","DOI":"10.2991\/ictcs-14.2014.12"},{"key":"9096_CR91","doi-asserted-by":"crossref","unstructured":"Liu R, Srivastava M. PROTC: PROTeCting drone\u2019s peripherals through ARM trustzone. In: Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications. 2017, 1\u20136","DOI":"10.1145\/3086439.3086443"},{"key":"9096_CR92","doi-asserted-by":"crossref","unstructured":"Fitzek A, Achleitner F, Winter J, Hein D. The ANDIX research OS-ARM TrustZone meets industrial control systems security. In: Proceedings of the 13th IEEE International Conference on Industrial Informatics. 2015, 88\u201393","DOI":"10.1109\/INDIN.2015.7281715"},{"key":"9096_CR93","doi-asserted-by":"crossref","unstructured":"Ying K, Ahlawat A, Alsharifi B, Jiang Y, Thavai P, Du W. TruZ-Droid: integrating TrustZone with mobile operating system. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 2018, 14\u201327","DOI":"10.1145\/3210240.3210338"},{"key":"9096_CR94","doi-asserted-by":"crossref","unstructured":"Winter J. Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. 2008, 21\u201330","DOI":"10.1145\/1456455.1456460"},{"key":"9096_CR95","doi-asserted-by":"crossref","unstructured":"Jia L, Zhu M, Tu B. T-VMI: trusted virtual machine introspection in cloud environments. In: Proceedings of the 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing. 2017, 478\u2013487","DOI":"10.1109\/CCGRID.2017.48"},{"key":"9096_CR96","doi-asserted-by":"crossref","unstructured":"Cho H, Zhang P, Kim D, Park J, Lee C H, Zhao Z, Doup\u00e9 A, Ahn G J. Prime+ count: novel cross-world covert channels on arm trustzone. In: Proceedings of the 34th Annual Computer Security Applications Conference. 2018, 441\u2013452","DOI":"10.1145\/3274694.3274704"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9096-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-019-9096-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9096-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T20:21:37Z","timestamp":1658348497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-019-9096-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,31]]},"references-count":96,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9096"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-9096-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,31]]},"assertion":[{"value":"19 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"153808"}}