{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:48:27Z","timestamp":1772632107665,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00031","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"213-225","source":"Crossref","is-referenced-by-count":0,"title":["EDL: Efficient Data-Oblivious Loops"],"prefix":"10.1109","author":[{"given":"Biniyam","family":"Tiruye","sequence":"first","affiliation":[{"name":"University of Michigan,Ann Arbor,Michigan,USA"}]},{"given":"Lauren","family":"Biernacki","sequence":"additional","affiliation":[{"name":"Lafayette College,Easton,Pennsylvania,USA"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan,Ann Arbor,Michigan,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref2","author":"Bernstein","year":"2005","journal-title":"Cache-timing attacks on AES"},{"key":"ref3","author":"Percival","year":"2005","journal-title":"Cache missing for fun and profit"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"ref6","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"27th \\{USENIX\\} Security Symposium (\\{USENIX\\} Security 18)","author":"Lipp","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"ref9","article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT)","author":"Brasser","year":"2017"},{"key":"ref10","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Van Bulck","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446102"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250723"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1145\/3307650.3322246","article-title":"New attacks and defense for encrypted-address cache","volume-title":"Proceedings of the 46th International Symposium on Computer Architecture","author":"Qureshi","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_14"},{"key":"ref18","first-page":"431","article-title":"Raccoon: Closing digital side-channels through obfuscated execution","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Rane"},{"key":"ref19","first-page":"283298","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng","year":"2017"},{"issue":"6","key":"ref20","first-page":"93","article-title":"An oblivious general-purpose SQL database for the cloud","volume":"abs\/1710.00458","author":"Eskandarian","year":"2017","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23061"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS57527.2023.00027"},{"key":"ref27","first-page":"997","article-title":"Ring oram: Closing the gap between small and large client storage oblivious ram","author":"Ren","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23320"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"key":"ref30","article-title":"Evolution of oblivious RAM schemes","volume-title":"Eindhoven University of Technology","author":"Teeuwen","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00026"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1137\/s003614450342480"},{"key":"ref38","volume-title":"Dna sequence dataset","author":"Singh Chauhan","year":"2020"},{"key":"ref39","year":"2023","journal-title":"OpenAI. Gpt-3: Generative pre-trained transformer"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410393.pdf?arnumber=11410393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T06:51:17Z","timestamp":1772607077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00031","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}