{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:39Z","timestamp":1750306359410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T00:00:00Z","timestamp":1481500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,12]]},"DOI":"10.1145\/3007788.3007794","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T14:31:54Z","timestamp":1481639514000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control"],"prefix":"10.1145","author":[{"given":"Marcus","family":"V\u00f6lp","sequence":"first","affiliation":[{"name":"CritiX Group, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"}]},{"given":"Adam","family":"Lackorzynski","sequence":"additional","affiliation":[{"name":"Kernkonzept GmbH and Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"J\u00e9r\u00e9mie","family":"Decouchant","sequence":"additional","affiliation":[{"name":"CritiX Group, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"}]},{"given":"Vincent","family":"Rahli","sequence":"additional","affiliation":[{"name":"CritiX Group, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"}]},{"given":"Francisco","family":"Rocha","sequence":"additional","affiliation":[{"name":"CritiX Group, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"}]},{"given":"Paulo","family":"Esteves-Verissimo","sequence":"additional","affiliation":[{"name":"CritiX Group, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2016,12,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325702"},{"key":"e_1_3_2_1_2_1","volume-title":"Intel SGX explained. MIT - Techreport","author":"Costan V.","year":"2016","unstructured":"V. Costan and S. Devadas . Intel SGX explained. MIT - Techreport , 2016 . https:\/\/eprint.iacr.org\/2016\/086.pdf ( Accessed : 2016-07-22). V. Costan and S. Devadas. Intel SGX explained. MIT - Techreport, 2016. https:\/\/eprint.iacr.org\/2016\/086.pdf (Accessed: 2016-07-22)."},{"key":"e_1_3_2_1_3_1","first-page":"251","volume-title":"Moat: a virtual private network appliance and services platform","author":"Denker J. S.","year":"1999","unstructured":"J. S. Denker , S. M. Bellovin , H. Daniel , N. L. Mintz , T. Killian , and M. Plotnick . Moat: a virtual private network appliance and services platform . pages 251 -- 260 , 1999 . J. S. Denker, S. M. Bellovin, H. Daniel, N. L. Mintz, T. Killian, and M. Plotnick. Moat: a virtual private network appliance and services platform. pages 251--260, 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133615"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224075"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_23"},{"key":"e_1_3_2_1_10_1","volume-title":"Cache attacks and countermeasures: the case of AES. IACR Cryptology ePrint Archive","author":"Osvik D. A.","year":"2005","unstructured":"D. A. Osvik , A. Shamir , and E. Tromer . Cache attacks and countermeasures: the case of AES. IACR Cryptology ePrint Archive , 2005 : 271, 2005. D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of AES. IACR Cryptology ePrint Archive, 2005:271, 2005."},{"key":"e_1_3_2_1_11_1","first-page":"4","volume-title":"Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium -","volume":"3","author":"Uhlig V.","year":"2004","unstructured":"V. Uhlig , J. LeVasseur , E. Skoglund , and U. Dannowski . Towards scalable multiprocessor virtual machines . In Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium - Volume 3 , VM'04, pages 4 -- 4 , Berkeley, CA, USA , 2004 . USENIX Association. V. Uhlig, J. LeVasseur, E. Skoglund, and U. Dannowski. Towards scalable multiprocessor virtual machines. In Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium - Volume 3, VM'04, pages 4--4, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.56"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"Middleware '16: 17th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP"],"location":"Trento Italy","acronym":"Middleware '16"},"container-title":["Proceedings of the 1st Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007788.3007794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3007788.3007794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:11Z","timestamp":1750222571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007788.3007794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,12]]},"references-count":14,"alternative-id":["10.1145\/3007788.3007794","10.1145\/3007788"],"URL":"https:\/\/doi.org\/10.1145\/3007788.3007794","relation":{},"subject":[],"published":{"date-parts":[[2016,12,12]]},"assertion":[{"value":"2016-12-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}