{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:57Z","timestamp":1772164017926,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T00:00:00Z","timestamp":1476835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,19]]},"DOI":"10.1145\/2983990.2984002","type":"proceedings-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T11:58:54Z","timestamp":1476964734000},"page":"494-513","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Automatic enforcement of expressive security policies using enclaves"],"prefix":"10.1145","author":[{"given":"Anitha","family":"Gollamudi","sequence":"first","affiliation":[{"name":"Harvard University, USA"}]},{"given":"Stephen","family":"Chong","sequence":"additional","affiliation":[{"name":"Harvard University, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929828"},{"key":"e_1_3_2_1_2_1","volume-title":"Sept.","year":"2015","unstructured":"Apple. iOS security. https:\/\/www.apple.com\/business\/ docs\/iOS_Security_Guide.pdf , Sept. 2015 . Apple. iOS security. https:\/\/www.apple.com\/business\/ docs\/iOS_Security_Guide.pdf, Sept. 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.22"},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. ARM security technology \u2014 building a secure system using TrustZone technology. http: \/\/infocenter.arm.com\/help\/topic\/com.arm. doc.prd29-genc-009492c\/PRD29-GENC-009492C_ trustzone_security_whitepaper.pdf 2009.  ARM. ARM security technology \u2014 building a secure system using TrustZone technology. http: \/\/infocenter.arm.com\/help\/topic\/com.arm. doc.prd29-genc-009492c\/PRD29-GENC-009492C_ trustzone_security_whitepaper.pdf 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.30"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(01)00341-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.12"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security","author":"Chow J.","year":"2005","unstructured":"J. Chow , B. Pfaff , T. Garfinkel , and M. Rosenblum . Shredding your garbage: Reducing data lifetime through secure deallocation . In USENIX Security , 2005 . J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding your garbage: Reducing data lifetime through secure deallocation. In USENIX Security, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067625.806556"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_15_1","first-page":"75","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation","author":"Dunn A. M.","year":"2012","unstructured":"A. M. Dunn , M. Z. Lee , S. Jana , S. Kim , M. Silberstein , Y. Xu , V. Shmatikov , and E. Witchel . Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation , pages 61\u2013 75 , 2012 . A. M. Dunn, M. Z. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu, V. Shmatikov, and E. Witchel. Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pages 61\u201375, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987211.1987223"},{"key":"e_1_3_2_1_17_1","unstructured":"GlobalPlatform. Trusted user interface API specification v1.0. http:\/\/www.globalplatform.org\/ specificationsdevice.asp 2013.  GlobalPlatform. Trusted user interface API specification v1.0. http:\/\/www.globalplatform.org\/ specificationsdevice.asp 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_19_1","volume-title":"June","author":"Gollamudi A.","year":"2016","unstructured":"A. Gollamudi . Impslator. https:\/\/github.com\/anithag\/ impslator , June 2016 . A. Gollamudi. Impslator. https:\/\/github.com\/anithag\/ impslator, June 2016."},{"key":"e_1_3_2_1_21_1","first-page":"54","volume-title":"The Tenth USENIX Security Symposium Proceedings","author":"Gutmann P.","year":"2001","unstructured":"P. Gutmann . Data remanence in semiconductor devices . In The Tenth USENIX Security Symposium Proceedings , pages 39\u2013 54 , 2001 . P. Gutmann. Data remanence in semiconductor devices. In The Tenth USENIX Security Symposium Proceedings, pages 39\u201354, 2001."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Halderman J. A.","year":"2008","unstructured":"J. A. Halderman , S. D. Schoen , N. Heninger , W. Clarkson , W. Paul , J. A. Calandrino , A. J. Feldman , J. Appelbaum , and E. W. Felten . Lest we remember: Cold boot attacks on encryption keys . In Proceedings of the 17th USENIX Security Symposium , July 2008 . J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium, July 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Hawblitzel C.","year":"2014","unstructured":"C. Hawblitzel , J. Howell , J. R. Lorch , A. Narayan , B. Parno , D. Zhang , and B. Zill . Ironclad apps: End-to-end security via automated full-system verification . In USENIX Symposium on Operating Systems Design and Implementation , Oct. 2014 . C. Hawblitzel, J. Howell, J. R. Lorch, A. Narayan, B. Parno, D. Zhang, and B. Zill. Ironclad apps: End-to-end security via automated full-system verification. In USENIX Symposium on Operating Systems Design and Implementation, Oct. 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792878.1792903"},{"key":"e_1_3_2_1_25_1","volume-title":"Intel software guard extensions (Intel SGX) programming reference. https:\/\/software.intel.com\/sites\/ default\/files\/managed\/48\/88\/329298-002.pdf","year":"2014","unstructured":"Intel. Intel software guard extensions (Intel SGX) programming reference. https:\/\/software.intel.com\/sites\/ default\/files\/managed\/48\/88\/329298-002.pdf , 2014 . Intel. Intel software guard extensions (Intel SGX) programming reference. https:\/\/software.intel.com\/sites\/ default\/files\/managed\/48\/88\/329298-002.pdf, 2014."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009673"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699503"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_30_1","first-page":"191","volume-title":"Proceedings of the 2003 International Symposium on Software Security, number 3233 in Lecture Notes in Computer Science","author":"Sabelfeld A.","year":"2004","unstructured":"A. Sabelfeld and A. C. Myers . A model for delimited release . In Proceedings of the 2003 International Symposium on Software Security, number 3233 in Lecture Notes in Computer Science , pages 174\u2013 191 , 2004 . A. Sabelfeld and A. C. Myers. A model for delimited release. In Proceedings of the 2003 International Symposium on Software Security, number 3233 in Lecture Notes in Computer Science, pages 174\u2013191, 2004."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.15"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.02.002"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908113"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"}],"event":{"name":"SPLASH '16: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","location":"Amsterdam Netherlands","acronym":"SPLASH '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"]},"container-title":["Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2983990.2984002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2983990.2984002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:39:52Z","timestamp":1750203592000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2983990.2984002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,19]]},"references-count":36,"alternative-id":["10.1145\/2983990.2984002","10.1145\/2983990"],"URL":"https:\/\/doi.org\/10.1145\/2983990.2984002","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3022671.2984002","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,10,19]]},"assertion":[{"value":"2016-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}