{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:24:24Z","timestamp":1773786264138,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11132848","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["IntraFuzz: Coverage-Guided Intra-Enclave Fuzzing for Intel SGX Applications"],"prefix":"10.1109","author":[{"given":"Jinhua","family":"Cui","sequence":"first","affiliation":[{"name":"Hunan University,College of Semiconductors (College of Integrated Circuits),Changsha,China,410082"}]},{"given":"Qiao","family":"Peng","sequence":"additional","affiliation":[{"name":"Hunan University,College of Semiconductors (College of Integrated Circuits),Changsha,China,410082"}]},{"given":"Yiwen","family":"Yao","sequence":"additional","affiliation":[{"name":"Hunan University,College of Semiconductors (College of Integrated Circuits),Changsha,China,410082"}]},{"given":"Ke","family":"Ye","sequence":"additional","affiliation":[{"name":"Hunan University,College of Semiconductors (College of Integrated Circuits),Changsha,China,410082"}]},{"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hunan University,College of Semiconductors (College of Integrated Circuits),Changsha,China,410082"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Microsoft azure confidential computing with intel software guard extensions"},{"key":"ref2","article-title":"The critical need for confidential computing","author":"Associates"},{"key":"ref3","article-title":"Alibaba cloud ecs bare metal instance supports intel sgx"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"key":"ref6","article-title":"Intel software guard extensions sdk-documentation"},{"key":"ref7","article-title":"Intel sgx explained","author":"Costan","year":"2016","journal-title":"IACR Cryptol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484821"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378486"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24819"},{"key":"ref12","article-title":"When good turns evil: Using intel sgx to stealthily steal bitcoins","author":"Schwarz","year":"2018"},{"key":"ref13","article-title":"The wolf in sgx clothing","author":"Marschalek","year":"2018","journal-title":"Bluehat IL"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_9"},{"key":"ref15","first-page":"523","article-title":"Hacking in darkness: Return-oriented programming against secure enclaves","author":"Lee","year":"2017","journal-title":"USENIX Security"},{"key":"ref16","article-title":"Sgaxe: Dfc string pattern matching library for sgx application","author":"Van Schaik","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"ref19","first-page":"645","article-title":"Graphene-SGX: A practical library OS for unmodified applications on SGX","author":"Tsai","year":"2017","journal-title":"USENIX ATC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3532862"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"ref22","article-title":"Open enclave sdk"},{"key":"ref23","article-title":"Asylo: An open and flexible framework for enclave applications"},{"key":"ref24","first-page":"3147","article-title":"SGXFuzz: Efficiently synthesizing nested structures for sgx enclave fuzzing","author":"Cloosters","year":"2022","journal-title":"USENIX Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607215"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24328"},{"key":"ref28","first-page":"841","article-title":"TeeRex: Discovery and exploitation of memory corruption vulnerabilities in sgx enclaves","author":"Cloosters","year":"2020","journal-title":"USENIX Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3474123.3486755"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623213"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00090"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567994"},{"key":"ref33","first-page":"4069","article-title":"Controlled data races in enclaves: Attacks and detection","author":"Chen","journal-title":"USENIX Security, 2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"issue":"11","key":"ref35","first-page":"0","article-title":"Intel\u00ae 64 and ia-32 architectures software developer\u2019s manual","volume":"2","author":"Guide","year":"2011","journal-title":"Volume 3B: System programming Guide, Part"},{"key":"ref36","article-title":"LibFuzzer"},{"key":"ref37","article-title":"Honggfuzz","author":"Swiecki"},{"key":"ref38","article-title":"How to run intel\u00ae software guard extensions\u2019 simulation mode"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"ref40","article-title":"Sgxcryptofile - app for encrypting and decrypting files using intel sgx"},{"key":"ref41","article-title":"Trusted hardware assisted genome-wide association studies"},{"key":"ref42","article-title":"Dfc string pattern matching library for sgx application"},{"key":"ref43","volume-title":"sgx-kmeans"},{"key":"ref44","article-title":"Simple password-wallet application based on intel sgx for linux"},{"key":"ref45","article-title":"guess-the-number"},{"key":"ref46","article-title":"Aes-ni crypto for intel sgx"},{"key":"ref47","article-title":"The nbench benchmark ported to sgx"},{"key":"ref48","article-title":"Switchlesssgxsan"},{"key":"ref49","volume-title":"Sampleencalve"},{"key":"ref50","article-title":"Sgx-darknet: Sgx compatible ml library"},{"key":"ref51","article-title":"Port of webassembly interpreter to run inside an sgx enclave"},{"key":"ref52","volume-title":"sgxvpn"},{"key":"ref53","article-title":"Sample for allocating and managing untrusted memory inside an enclave"},{"key":"ref54","article-title":"Mex sgx"},{"key":"ref55","article-title":"Bank app built usig linux sgx"},{"key":"ref56","article-title":"A lisp interpreter in sgx for use as a secure autograder"},{"key":"ref57","article-title":"Intel-sgx-programs","author":"Sen"},{"key":"ref58","article-title":"Remoteattestation"},{"key":"ref59","article-title":"The heartb donayam1leed bug"},{"key":"ref60","first-page":"309","article-title":"Addresssanitizer: A fast address sanity checker","author":"Serebryany","year":"2012","journal-title":"USENIX ATC"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23312"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11132848.pdf?arnumber=11132848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T05:24:30Z","timestamp":1758000270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11132848\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11132848","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}