{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T18:19:57Z","timestamp":1777141197834,"version":"3.51.4"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11240873","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["SNO: Securing Network Function Offloading on FPGA-based SmartNICs in Untrusted Clouds"],"prefix":"10.1109","author":[{"given":"Yunkun","family":"Liao","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]},{"given":"Jingya","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]},{"given":"Wenyan","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]},{"given":"Hang","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]},{"given":"Guihai","family":"Yan","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Laboratory of Processors,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"51","article-title":"Azure accelerated networking:smartnics in the public cloud","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Firestone"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544238"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3626202.3637564"},{"key":"ref4","article-title":"Intel sgx explained","author":"Costan","year":"2016","journal-title":"IACR Cryptol, EPrint Arch"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-144"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3650071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586207"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507733"},{"key":"ref9","article-title":"Fpga ipu platform c5000x-pl","year":"2025"},{"key":"ref10","article-title":"Amd alveo sn1000 smartnic accelerator card","year":"2025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672224"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665678"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3193827"},{"key":"ref14","article-title":"Developing tamper-resistant designs with zynq ultrascale+ devices","author":"Peterson","year":"2018","journal-title":"Xilinx Application Note"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38c"},{"key":"ref16","article-title":"Modelling and automatically analysing privacy properties for honest-but-curious adversaries","author":"Paverd","year":"2014","journal-title":"Tech. Rep"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240814"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3652597"},{"issue":"2020","key":"ref21","first-page":"1450","article-title":"Strengthening vm isolation with integrity protection and more","volume":"53","author":"Sev-Snp","year":"2020","journal-title":"White Paper, January"},{"key":"ref22","article-title":"On-chip memory","year":"2025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3472959"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3355772"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.400"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582820"},{"key":"ref27","article-title":"Diffie\u2013hellman key exchange \u2014 Wikipedia, the free encyclopedia","year":"2025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00015"},{"key":"ref29","first-page":"243","article-title":"Panic: A high-performance programmable nic for multi-tenant networks","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Lin"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2016.7831617"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3676536.3676844"},{"key":"ref32","article-title":"Dma for pci express (pcie) subsystem","year":"2025"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1150019.1136502"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5288"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2010.5619894"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5555\/3488766.3488822"},{"key":"ref37","article-title":"Aes-gcm-128-192-256-bits","year":"2023"},{"key":"ref38","article-title":"Alibaba cloud fpga: Open-source fpga development resources","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230560"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00079"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2022.3189207"},{"key":"ref42","article-title":"Aes-gcm for efficient authenticated encryption\u2013ending the reign of hmac-sha-1","author":"Gueron","year":"2013","journal-title":"Real-World Cryptography"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2015.7089065"},{"key":"ref44","article-title":"Comparing the speed of vm creation and ssh access of cloud providers","author":"Hoffman","year":"2017"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","location":"Munich, Germany","start":{"date-parts":[[2025,10,26]]},"end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11240873.pdf?arnumber=11240873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:45:32Z","timestamp":1763703932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/iccad66269.2025.11240873","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}