{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:06Z","timestamp":1773840186518,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:00:00Z","timestamp":1490400000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["LM011028-01"],"award-info":[{"award-number":["LM011028-01"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1228843"],"award-info":[{"award-number":["CNS-1228843"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2872362.2872372","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"277-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Sego"],"prefix":"10.1145","author":[{"given":"Youngjin","family":"Kwon","sequence":"first","affiliation":[{"name":"The university of Texas at Austin, Austin, TX, USA"}]},{"given":"Alan M.","family":"Dunn","sequence":"additional","affiliation":[{"name":"Google, Mountain View, USA"}]},{"given":"Michael Z.","family":"Lee","sequence":"additional","affiliation":[{"name":"Facebook, New York City, USA"}]},{"given":"Owen S.","family":"Hofmann","sequence":"additional","affiliation":[{"name":"Google, Seattle, USA"}]},{"given":"Yuanzhong","family":"Xu","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, USA"}]},{"given":"Emmett","family":"Witchel","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DokuWiki. https:\/\/www.dokuwiki.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"HPC Graph Analysis. http:\/\/www.graphanalysis.org\/benchmark\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel Trusted Execution Technology. http:\/\/www.intel.com\/technology\/security\/."},{"key":"e_1_3_2_1_4_1","unstructured":"OpenLDAP. http:\/\/www.openldap.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel SHA Extensions 2013. https:\/\/software.intel.com\/en-us\/articles\/intel-sha-extensions."},{"key":"e_1_3_2_1_6_1","unstructured":"AES-GCM Encryption Performance on Intel Xeon E5 v3 Processors 2015. https:\/\/software.intel.com\/en-us\/articles\/aes-gcm-encryption-performance-on-intel-xeon-e5-v3-processors."},{"key":"e_1_3_2_1_7_1","unstructured":"AES-NI SSL performance 2015. https:\/\/calomel.org\/aesni_ssl_performance.html."},{"key":"e_1_3_2_1_8_1","unstructured":"FlashArray\/\/m Technical Specs 2015. http:\/\/www.purestorage.com\/products\/technical-specifications\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Samsung V-NAND SSD 2015. http:\/\/www.samsung.com\/global\/business\/semiconductor\/minisite\/SSD\/global\/html\/ssd850pro\/specifications.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"e_1_3_2_1_11_1","volume-title":"OSDI","author":"Baumann Andrew","year":"2014","unstructured":"Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding applications from an untrusted cloud with haven. In OSDI, 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237154"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"e_1_3_2_1_16_1","unstructured":"John Criswell. Secure virtual architecture: security for commodity software systems. PhD thesis University of Illinois at Urbana-Champaign 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. RFC 5246: The Transport Layer Security (TLS) Protocol: Version 1.2. http:\/\/tools.ietf.org\/html\/rfc5246 2008.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_19_1","volume-title":"ACM International Conference on Management of Data (SIGMOD)","author":"Do Jaeyoung","year":"2013","unstructured":"Jaeyoung Do, Yang-Suk Kee, Jignesh M. Patel, Chanik Park, Kwanghyun Park, and David J. DeWitt. Query processing on smart ssds: Opportunities and challenges. In ACM International Conference on Management of Data (SIGMOD), 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Morris Dworkin. NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38D\/SP-800-38D.pdf 2007.","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"e_1_3_2_1_21_1","first-page":"261","volume-title":"The Ottawa Linux Symposium","author":"Eigler Frank Ch.","year":"2006","unstructured":"Frank Ch. Eigler. Problem solving with systemtap. In The Ottawa Linux Symposium, pages 261--268, 2006."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security","author":"Feldman Ariel J","year":"2012","unstructured":"Ariel J Feldman, Aaron Blankstein, Michael J Freedman, and Edward W Felten. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. In USENIX Security, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_24_1","volume-title":"Software Guard Extensions Programming Reference","author":"Intel Corporation","year":"2015","unstructured":"Intel Corporation. Software Guard Extensions Programming Reference, 2015. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Yanlin Li Adrian Perrig Jonathan McCune James Newsome Brandon Baker and Will Drewry. MiniBox: A two-way sandbox for x86 native code. Technical Report CMU-CyLab-14-001 CyLab Carnegia Mellon University 2014."},{"key":"e_1_3_2_1_26_1","first-page":"31","volume-title":"FAST","author":"Lu Lanyue","year":"2013","unstructured":"Lanyue Lu, Andrea C Arpaci-Dusseau, Remzi H Arpaci-Dusseau, and Shan Lu. A study of linux file system evolution. In FAST, pages 31--44, 2013."},{"key":"e_1_3_2_1_27_1","volume-title":"TrustVisor: Efficient TCB reduction and attestation","author":"McCune Jonathan M.","year":"2010","unstructured":"Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE S&P, May 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.01"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950401"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2731186.2731199"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX ATC","author":"Sweeney Adam","year":"1996","unstructured":"Adam Sweeney, Doug Doucette, Wei Hu, Curtis Anderson, Mike Nishimoto, and Geoff Peck. Scalability in the xfs file system. In USENIX ATC, 1996."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945466"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX ATC","author":"Wang Xiaoguang","year":"2015","unstructured":"Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, and Yajin Zhou. Secpod: a framework for virtualization-based security systems. In USENIX ATC, 2015."},{"key":"e_1_3_2_1_36_1","volume-title":"Controlled-channel attacks: Deterministic side channels for untrusted operating systems","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE S&P, 2015."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"e_1_3_2_1_38_1","volume-title":"HotDep","author":"Yoshimura Takeshi","year":"2012","unstructured":"Takeshi Yoshimura, Hiroshi Yamada, and Kenji Kono. Is linux kernel oops useful or not. In HotDep, 2012."},{"key":"e_1_3_2_1_39_1","volume-title":"Wired","author":"Zetter Kim","year":"2015","unstructured":"Kim Zetter. Hacking team leak shows how secretive zero-day exploit sales work. Wired, 2015."}],"event":{"name":"ASPLOS '16: Architectural Support for Programming Languages and Operating Systems","location":"Atlanta Georgia USA","acronym":"ASPLOS '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872372","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:41:54Z","timestamp":1763458914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872372"}},"subtitle":["Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services"],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":39,"alternative-id":["10.1145\/2872362.2872372","10.1145\/2872362"],"URL":"https:\/\/doi.org\/10.1145\/2872362.2872372","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2954679.2872372","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2980024.2872372","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}