{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:40:08Z","timestamp":1767066008513,"version":"3.37.3"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872430","61402342","61772384"],"award-info":[{"award-number":["61872430","61402342","61772384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2014CB340601"],"award-info":[{"award-number":["2014CB340601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"publisher","award":["KJ-17-103"],"award-info":[{"award-number":["KJ-17-103"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/tcc.2020.2985045","type":"journal-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T20:05:19Z","timestamp":1588017919000},"page":"1082-1099","source":"Crossref","is-referenced-by-count":7,"title":["S-Blocks: Lightweight and Trusted Virtual Security Function With SGX"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8813-7842","authenticated-orcid":false,"given":"Juan","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3567-8255","authenticated-orcid":false,"given":"Shirong","family":"Hao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-247X","authenticated-orcid":false,"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bo","family":"Zhao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"given":"Hongda","family":"Li","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Wenhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5091-8464","authenticated-orcid":false,"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Assurance Laboratory, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"689","article-title":"Scone: Secure linux containers with intel SGX","volume-title":"Proc. 12th USENIX Conf. Operating Syst. Des. Implementation","volume":"16","author":"Arnautov"},{"volume":"5","article-title":"TaLoS: Secure and transparent TLS termination inside SGX enclaves","author":"Aublin","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110116"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968453"},{"article-title":"vTPM: virtualizing the trusted platform module","volume-title":"Proc. Conf. Usenix Secur. Symp.","author":"Berger","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.15"},{"article-title":"SPX: Preserving end-to-end security for edge computing","year":"2018","author":"Bhardwaj","key":"ref8"},{"key":"ref9","article-title":"Network functions virtualisation (NFV)-NFV security: Problem statement","author":"Briscoe","year":"2014","journal-title":"White paper, ETSI NFV ISG"},{"key":"ref10","first-page":"111","article-title":"Netbrick: A high-performance, low-power hardware platform for wireless and hybrid sensor networks","volume-title":"Proc. IEEE Int. Conf. Mobile Ad-hoc Sensor Syst.","author":"Camplani"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"ref13","first-page":"273","article-title":"Live migration of virtual machines","volume-title":"Proc. Conf. Symp. Netw. Syst. Des. Implementation","author":"Clark"},{"key":"ref14","article-title":"Intel SGX explained","volume":"2016","author":"Costan","year":"2016","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241161"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3040994"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113222"},{"key":"ref19","first-page":"401","article-title":"Farm: Fast remote memory","volume-title":"Proc. 11th USENIX Symp. Netw. Syst. Des. Implementation","author":"Dragojevi\u0107"},{"article-title":"Lightbox: SGX-assisted secure network functions at near-native speed","year":"2017","author":"Duan","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_16"},{"key":"ref24","first-page":"745","article-title":"ClickNF: A modular stack for custom network functions","volume-title":"Proc. USENIX Annu. Techn. Conf.","author":"Gallo"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2785989.2785997"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"ref27","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","volume-title":"Proc. USENIX Secur. Symp.","author":"Gruss"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106994"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963800"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2721401"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.514"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2785989.2785993"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"author":"Kohler","key":"ref38","article-title":"Click for measurement"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref40","first-page":"16","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","volume-title":"Proc. 26th USENIX Secur. Symp. USENIX Secur.","author":"Lee"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084166"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243862"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-011-0194-3"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967363"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2016.162"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_796"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784459"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377697"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713276"},{"key":"ref54","first-page":"203","article-title":"Netbricks: Taking the V out of NFV","volume-title":"Proc. Usenix Conf. Operating Syst. Des. Implementation","author":"Panda"},{"key":"ref55","first-page":"201","article-title":"Safebricks: Shielding network functions in the cloud","volume-title":"Proc. 15th USENIX Symp. Netw. Syst. Des. Implementation","author":"Poddar"},{"key":"ref56","first-page":"227","article-title":"Split\/merge: System support for elastic execution in virtual middleboxes","volume-title":"Proc. Usenix Conf. Netw. Syst. Des. Implementation","author":"Rajagopalan"},{"key":"ref57","first-page":"10","article-title":"Policy-sealed data: A new abstraction for building trusted cloud services","volume-title":"Proc. Usenix Conf. Secur. Symp.","author":"Santos"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185469"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2508044"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784446"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140374"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23200"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940155"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9789509\/09079570.pdf?arnumber=9079570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:25:10Z","timestamp":1704839110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9079570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":67,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2020.2985045","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}