{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:04:22Z","timestamp":1769033062596,"version":"3.49.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4232019"],"award-info":[{"award-number":["4232019"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331499","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["The Twilight of SGX, but Not its Tests: An In-Depth Study of Testing in SGX Projects"],"prefix":"10.1109","author":[{"given":"Jiapei","family":"Deng","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology,Beijing,China"}]},{"given":"Yin","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","journal-title":"CVE- 2017 \u20136131"},{"key":"ref2","journal-title":"CVE-2021\u201339014"},{"key":"ref3","journal-title":"CVE-2022\u201339397"},{"key":"ref4","journal-title":"CVE- 2023\u2013 32990"},{"key":"ref5","volume-title":"Alibaba Cloud","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24819"},{"key":"ref7","first-page":"3147","article-title":"{SGXFuzz}: Efficiently synthesizing nested structures for {SGX} enclave fuzzing","volume-title":"31st USENIX Security Symposium (USENIX Security)","author":"Cloosters"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104457"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639124"},{"key":"ref11","volume-title":"GitHub REST API documentation","year":"2025"},{"key":"ref12","volume-title":"GlobalPlatform, TEE system architecture, technical report","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00021"},{"key":"ref14","volume-title":"IBM - Cloud, PowerVS and Ceph aaS - Structured Ideas","year":"2025"},{"key":"ref15","volume-title":"IBM TechXChange Community","year":"2025"},{"key":"ref16","volume-title":"Stack Exchange","author":"Inc","year":"2025"},{"key":"ref17","volume-title":"Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) SDK for Windows* OS","year":"2020"},{"key":"ref18","volume-title":"Intel Processors Supporting Intel SGX","year":"2025"},{"key":"ref19","volume-title":"Intel Software Guard Extensions (SGX)","year":"2025"},{"key":"ref20","article-title":"Intel\u00ae Software Guard Extensions Developer Guide","volume-title":"855\/","year":"2025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00035"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/3597503.3639166","article-title":"A first look at the inheritance-induced redundant test execution","volume-title":"Proceedings of the IEEEIACM 46th International Conference on Software Engineering","author":"Kim","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS55109.2022.00014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9213-3_49"},{"key":"ref25","article-title":"A survey of secure computation using trusted execution environments","author":"Li","year":"2023","journal-title":"arXiv preprint"},{"key":"ref26","volume-title":"Microsoft Azure Share your Ideas","year":"2025"},{"key":"ref27","volume-title":"Microsoft Community Hub","year":"2025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.52783\/jisem.v10i12s.1805"},{"key":"ref29","article-title":"A survey of published attacks on intel sgx","author":"Nilsson","year":"2020","journal-title":"arXiv preprint"},{"key":"ref30","volume-title":"OVHcloud Community","year":"2025"},{"key":"ref31","volume-title":"7 examples of real-life data breaches caused by insider threats","author":"Pryimenko","year":"2024"},{"key":"ref32","volume-title":"Rising to the Challenge \u2014 Data Secu-rity with Intel Confidential Computing","author":"Rao","year":"2022"},{"key":"ref33","volume-title":"Federal government to force tech giants to reveal user data","year":"2018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567994"},{"key":"ref35","author":"Van Schaik","year":"2020","journal-title":"Sgaxe: How sgx fails in practice"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00260"},{"key":"ref37","article-title":"Interface-based side channel attack against intel sgx","author":"Wang","year":"2018","journal-title":"arXiv preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3593021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607215"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-9096-y"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331499.pdf?arnumber=11331499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:08:18Z","timestamp":1768979298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331499","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}