{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:59Z","timestamp":1772164019406,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:00:00Z","timestamp":1498262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,24]]},"DOI":"10.1145\/3079856.3080208","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T15:40:01Z","timestamp":1497541201000},"page":"81-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Regaining Lost Cycles with HotCalls"],"prefix":"10.1145","author":[{"given":"Ofir","family":"Weisse","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Valeria","family":"Bertacco","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2017,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http_load - multiprocessing http test client. http:\/\/acme.com\/software\/http_load\/."},{"key":"e_1_3_2_1_2_1","unstructured":"SGX Secure Enclaves in Practice: Security and Crypto Review. Black Hat. https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Aumasson-SGX-Secure-Enclaves-In-Practice-Security-And-\\Crypto-Review.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Tiago Alves and Don Felton. 2004. TrustZone: Integrated Hardware and Software Security-Enabling Trusted Computing in Embedded Systems."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536358"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of HASP.","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology For CPU Based Attestation and sealing. In Proc. of HASP."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026930"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995914"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of USENIX Security.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.35"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_17_1","volume-title":"Security and Communication Networks","author":"Embleton Shawn","unstructured":"Shawn Embleton, Sherri Sparks, and Cliff C Zou. 2013. SMM Rootkits: A New Breed of OS Independent Malware. In Security and Communication Networks. Wiley Online Library."},{"key":"e_1_3_2_1_18_1","unstructured":"Nadeem Firasta Mark Buxton Paula Jinbo Kaveh Nasri and Shihjong Kuo. 2008. Intel AVX: New frontiers in performance improvements and energy efficiency."},{"key":"e_1_3_2_1_19_1","volume-title":"A Memory Encryption Engine Suitable for General Purpose Processors","author":"Gueron Shay","unstructured":"Shay Gueron. A Memory Encryption Engine Suitable for General Purpose Processors. Intel Corporation."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"J Alex Halderman Seth Schoen Nadia Heninger William Clarkson William Paul Joseph A Calandrino Ariel Feldman Jacob Appelbaum and Edward Felten. 2009. Lest We Remember: Cold-Boot Attacks on Encryption Keys. In Communications of the ACM. 10.1145\/1506409.1506429","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of ACM MICRO.","author":"Hilton Andrew Douglas","year":"2016","unstructured":"Andrew Douglas Hilton, BC Lee, and TS Lehman. 2016. PoisonIvy: Safe Speculation for Secure Memory. In Proc. of ACM MICRO."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026919"},{"key":"e_1_3_2_1_25_1","unstructured":"Intel. Intel SGX Software Development Kit (SDK). Intel. https:\/\/software.intel.com\/en-us\/sgx-sdk."},{"key":"e_1_3_2_1_26_1","unstructured":"Intel. Intel Software Guard Extensions SDK for Linux OS. Intel. https:\/\/01.org\/sites\/default\/files\/documentation\/intel_sgx_sdk_developer_reference_for_linux_os_pdf.pdf."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. Intel Software Guard Extensions SDK for Windows OS. Intel. https:\/\/software.intel.com\/sites\/default\/files\/managed\/b4\/cf\/Intel-SGX-SDK-Developer-Reference-for-Windows-OS.pdf."},{"key":"e_1_3_2_1_28_1","volume-title":"Software Developer Manual","unstructured":"Intel. Software Developer Manual, chapters 37--43. Intel. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/manuals\/64-ia-32-architectures-software-developer-manual-325462.pdf."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel. Software Guard Extensions: EPID Provisioning and Attestation Services. Intel. https:\/\/software.intel.com\/sites\/default\/files\/managed\/ac\/40\/2016%20WW10%20sgx%20provisioning%20and%20attesatation%20final.pdf."},{"key":"e_1_3_2_1_30_1","unstructured":"Iperf. A tool for active measurements of the maximum achievable bandwidth on IP networks. Iperf. https:\/\/iperf.fr\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of WIOSCA. Citeseer.","author":"Kumar Sanjay","year":"2007","unstructured":"Sanjay Kumar, Himanshu Raj, Karsten Schwan, and Ivan Ganev. 2007. Rearchitecting VMMs for Multicore Systems: The Sidecore Approach. In Proc. of WIOSCA. Citeseer."},{"key":"e_1_3_2_1_32_1","unstructured":"lighttpd. An open-source web server optimized for speed-critical environments. lighttpd. https:\/\/www.lighttpd.net\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485926"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542309"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Gil Neiger Amy Santoni Felix Leung Dion Rodgers and Rich Uhlig. 2006. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization.. In Intel Technology Journal.","DOI":"10.1535\/itj.1003.01"},{"key":"e_1_3_2_1_37_1","unstructured":"OpenSSL. Cryptography and SSL\/TLS Toolkit. OpenSSL. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_38_1","unstructured":"OpenVPN. An open source SSL VPN solution. OpenVPN. https:\/\/openvpn.net\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950399"},{"key":"e_1_3_2_1_41_1","unstructured":"Redis Labs. memtier_benchmark: A High-Throughput Benchmarking Tool for Redis & Memcached. Redis Labs. https:\/\/https:\/\/redislabs.com\/blog\/memtier_benchmark-a-high-throughput-benchmarking-tool-for-redis-memcached#.WBz0PNzHXeA."},{"key":"e_1_3_2_1_42_1","unstructured":"Paul Saab. 2008. Scaling Memcached at Facebook."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1268488.1268506"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924946"},{"key":"e_1_3_2_1_47_1","unstructured":"Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking SMM Memory via Intel CPU Cache Poisoning. In Invisible Things Lab."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of NSDI.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro Beekman, Raluca Ada Popa, Joseph Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In Proc. of NSDI."}],"event":{"name":"ISCA '17: The 44th Annual International Symposium on Computer Architecture","location":"Toronto ON Canada","acronym":"ISCA '17","sponsor":["IEEE IEEE Computer Society Technical Committee on Design Automation","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 44th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3079856.3080208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3079856.3080208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:37:15Z","timestamp":1750203435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3079856.3080208"}},"subtitle":["A Fast Interface for SGX Secure Enclaves"],"short-title":[],"issued":{"date-parts":[[2017,6,24]]},"references-count":46,"alternative-id":["10.1145\/3079856.3080208","10.1145\/3079856"],"URL":"https:\/\/doi.org\/10.1145\/3079856.3080208","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3140659.3080208","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,6,24]]},"assertion":[{"value":"2017-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}