{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:28:55Z","timestamp":1771025335950,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1566444"],"award-info":[{"award-number":["1566444"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134016","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"859-874","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["STACCO"],"prefix":"10.1145","author":[{"given":"Yuan","family":"Xiao","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Mengyuan","family":"Li","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Sanchuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Lucky thirteen: Breaking the TLS and DTLS record protocols 2013 IEEE Symposium on Security and Privacy","author":"Fardan Nadhem Al","unstructured":"Nadhem Al Fardan and Kenneth Paterson 2013. Lucky thirteen: Breaking the TLS and DTLS record protocols 2013 IEEE Symposium on Security and Privacy. IEEE."},{"key":"e_1_3_2_1_2_1","volume-title":"Lucky microseconds: A timing attack on Amazon's s2n implementation of TLS Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Albrecht Martin","unstructured":"Martin Albrecht and Kenneth Paterson 2016. Lucky microseconds: A timing attack on Amazon's s2n implementation of TLS Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 622--643."},{"key":"e_1_3_2_1_3_1","volume-title":"Control flow analysis ACM Sigplan Notices","author":"Allen Frances","unstructured":"Frances Allen. 1970. Control flow analysis ACM Sigplan Notices, Vol. Vol. 5. ACM, 1--19."},{"key":"e_1_3_2_1_4_1","volume-title":"Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC 23rd International Conference on Fast Software Encryption. Springer Berlin Heidelberg, 163--184","author":"Almeida Jos\u00e9 Bacelar","year":"2016","unstructured":"Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Gilles Barthe, and Franccois\" Dupressoir. 2016. Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC 23rd International Conference on Fast Software Encryption. Springer Berlin Heidelberg, 163--184."},{"key":"e_1_3_2_1_5_1","volume-title":"Verifying Constant-Time Implementations. In USENIX Security Symposium. 53--70","author":"Almeida Jos\u00e9 Bacelar","year":"2016","unstructured":"Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Franccois Dupressoir, and Michael Emmi 2016. Verifying Constant-Time Implementations. In USENIX Security Symposium. 53--70."},{"key":"e_1_3_2_1_6_1","volume-title":"Innovative technology for CPU based attestation and sealing 2nd international workshop on hardware and architectural support for security and privacy","author":"Anati Ittai","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing 2nd international workshop on hardware and architectural support for security and privacy, Vol. Vol. 13."},{"key":"e_1_3_2_1_7_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Aviram Nimrod","year":"2016","unstructured":"Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, Viktor Dukhovni, et almbox. 2016. DROWN: breaking TLS using SSLv2. In 25th USENIX Security Symposium (USENIX Security 16)."},{"key":"e_1_3_2_1_8_1","first-page":"608","article-title":"Efficient padding oracle attacks on cryptographic hardware","volume":"2012","author":"Bardou Romain","year":"2012","unstructured":"Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay 2012. Efficient padding oracle attacks on cryptographic hardware. Advances in Cryptology--CRYPTO 2012 (2012), 608--625.","journal-title":"Advances in Cryptology--CRYPTO"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_10_1","volume-title":"A messy state of the union: Taming the composite state machines of TLS 2015 IEEE Symposium on Security and Privacy","author":"Beurdouche Benjamin","unstructured":"Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, C\u00e9dric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, and Jean Karim Zinzindohoue 2015. A messy state of the union: Taming the composite state machines of TLS 2015 IEEE Symposium on Security and Privacy. IEEE, 535--552."},{"key":"e_1_3_2_1_11_1","volume-title":"Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1 Annual International Cryptology Conference","author":"Bleichenbacher Daniel","unstructured":"Daniel Bleichenbacher. 1998. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1 Annual International Cryptology Conference. Springer."},{"key":"e_1_3_2_1_12_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi 2017. Software Grand Exposure: SGX Cache Attacks Are Practical 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_34"},{"key":"e_1_3_2_1_15_1","unstructured":"Haibo Chen Fengzhe Zhang Cheng Chen Ziye Yang Rong Chen Binyu Zang and Wenbo Mao 2007. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor. (2007)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Sanchuan Chen Xiaokuan Zhang Michael Reiter and Yinqian Zhang 2017. Detecting privileged side-channel attacks in shielded execution with D\u00e9j\u00e1 Vu 2017 ACM on Asia Conference on Computer and Communications Security. ACM 7--18.","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_17_1","volume-title":"Ports","author":"Chen Xiaoxin","year":"2008","unstructured":"Xiaoxin Chen, Tal Garfinkel, E Christopher Lewis, Pratap Subrahmanyam, Carl Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R. K. Ports 2008. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In ACM SIGARCH Computer Architecture News, Vol. Vol. 36. ACM, 2--13."},{"key":"e_1_3_2_1_18_1","volume-title":"Guided Differential Testing of Certificate Validation in SSL\/TLS Implementations 10th Joint Meeting on Foundations of Software Engineering. ACM, 793--804","author":"Chen Yuting","year":"2015","unstructured":"Yuting Chen and Zhendong Su 2015. Guided Differential Testing of Certificate Validation in SSL\/TLS Implementations 10th Joint Meeting on Foundations of Software Engineering. ACM, 793--804."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_21_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation USENIX Security Symposium. 857--874","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia A Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation USENIX Security Symposium. 857--874."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security","volume":"15","author":"Ruiter Joeri De","year":"2015","unstructured":"Joeri De Ruiter and Erik Poll 2015. Protocol State Fuzzing of TLS Implementations. USENIX Security, Vol. Vol. 15. 193--206."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_25_1","volume-title":"Using Innovative Instructions to Create Trustworthy Software Solutions 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM","author":"Hoekstra Matthew","unstructured":"Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, and Juan Del Cuvillo 2013. Using Innovative Instructions to Create Trustworthy Software Solutions 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_27_1","volume-title":"Thomas Eisenbarth, and Berk Sunar","author":"Irazoqui Gorka","year":"2015","unstructured":"Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar 2015. Lucky 13 strikes back 10th ACM Symposium on Information, Computer and Communications Security. ACM, 85--96."},{"key":"e_1_3_2_1_28_1","volume-title":"Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption 17th European Symposium on Research in Computer Security","author":"Jager Tibor","unstructured":"Tibor Jager, Sebastian Schinzel, and Juraj Somorovsky. 2012. Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption 17th European Symposium on Research in Computer Security. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_30_1","unstructured":"Leo Kelion. 2016. `Thousands of popular sites' at risk of DROWN hack attacks. http:\/\/www.bbc.com\/news\/technology-35706730. (2016). [Online; accessed February-2017]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_33"},{"key":"e_1_3_2_1_32_1","volume-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing. arXiv preprint arXiv:1611.06952","author":"Lee Sangho","year":"2016","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2016. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. arXiv preprint arXiv:1611.06952 (2016)."},{"key":"e_1_3_2_1_33_1","volume-title":"2014 USENIX Annual Technical Conference.","author":"Li Yanlin","year":"2014","unstructured":"Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry. 2014. MiniBox: A Two-way Sandbox for x86 Native Code. In 2014 USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_34_1","volume-title":"Implementing an Untrusted Operating System on Trusted Hardware 19th ACM Symposium on Operating Systems Principles. ACM","author":"Lie David","unstructured":"David Lie, Chandramohan Thekkath, and Mark Horowitz. 2003. Implementing an Untrusted Operating System on Trusted Hardware 19th ACM Symposium on Operating Systems Principles. ACM."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_36_1","volume-title":"Annual International Cryptology Conference. Springer, 230--238","author":"Manger James","year":"2001","unstructured":"James Manger. 2001. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS# 1 v2. 0. Annual International Cryptology Conference. Springer, 230--238."},{"key":"e_1_3_2_1_37_1","first-page":"48","article-title":"ROTE: Rollback Protection for Trusted Execution","volume":"2017","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. IACR Cryptology ePrint Archive Vol. 2017 (2017), 48.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_39_1","volume-title":"Innovative instructions and software model for isolated execution. HASP@ ISCA","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday Savagaonkar 2013. Innovative instructions and software model for isolated execution. HASP@ ISCA Vol. 10 (2013)."},{"key":"e_1_3_2_1_40_1","volume-title":"New Bleichenbacher side channels and attacks 23rd USENIX Security Symposium (USENIX Security 14). 733--748","author":"Meyer Christopher","unstructured":"Christopher Meyer, Juraj Somorovsky, Eugen Weiss, J\u00f6rg Schwenk, Sebastian Schinzel, and Erik Tews 2014. Revisiting SSL\/TLS implementations: New Bleichenbacher side channels and attacks 23rd USENIX Security Symposium (USENIX Security 14). 733--748."},{"key":"e_1_3_2_1_41_1","unstructured":"Bodo M\u00f6ller Thai Duong and Krzysztof Kotowicz. 2014. This POODLE bites: exploiting the SSL 3.0 fallback. (2014). https:\/\/www.openssl.org\/ bodo\/ssl-poodle.pdf."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_43_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors USENIX Security Symposium. 619--636","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa 2016. Oblivious Multi-Party Machine Learning on Trusted Processors USENIX Security Symposium. 619--636."},{"key":"e_1_3_2_1_44_1","volume-title":"Pinplay: a framework for deterministic replay and reproducible analysis of parallel programs 8th annual IEEE\/ACM international symposium on Code generation and optimization. ACM, 2--11","author":"Patil Harish","unstructured":"Harish Patil, Cristiano Pereira, Mack Stallcup, Gregory Lueck, and James Cownie 2010. Pinplay: a framework for deterministic replay and reproducible analysis of parallel programs 8th annual IEEE\/ACM international symposium on Code generation and optimization. ACM, 2--11."},{"key":"e_1_3_2_1_45_1","volume-title":"Towards Application Security on Untrusted Operating Systems 3rd Conference on Hot Topics in Security.","author":"Dan R.","unstructured":"Dan R. K. Ports and Tal Garfinkel 2008. Towards Application Security on Untrusted Operating Systems 3rd Conference on Hot Topics in Security."},{"key":"e_1_3_2_1_46_1","unstructured":"Ashay Rane Calvin Lin and Mohit Tiwari 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution USENIX Security Symposium. 431--446."},{"key":"e_1_3_2_1_47_1","volume-title":"The transport layer security (TLS) protocol version 1.1. Transport","author":"Rescorla Eric","year":"2006","unstructured":"Eric Rescorla. 2006. The transport layer security (TLS) protocol version 1.1. Transport (2006)."},{"key":"e_1_3_2_1_48_1","volume-title":"VC3: Trustworthy data analytics in the cloud using SGX 2015 IEEE Symposium on Security and Privacy","author":"Schuster Felix","unstructured":"Felix Schuster, Manuel Costa, C\u00e9dric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX 2015 IEEE Symposium on Security and Privacy. IEEE, 38--54."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_50_1","volume-title":"SGX-Shield: Enabling address space layout randomization for SGX programs 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Seo Jaebaek","unstructured":"Jaebaek Seo, Byounyoung Lee, Seongmin Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim 2017. SGX-Shield: Enabling address space layout randomization for SGX programs 2017 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA."},{"key":"e_1_3_2_1_51_1","volume-title":"T-SGX: Eradicating controlled-channel attacks against enclave programs 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Shih Ming-Wei","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs 2017 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_53_1","volume-title":"PANOPLY: Low-TCB Linux Applications With SGX Enclaves 2017 Annual Network and Distributed System Security Symposium(NDSS)","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena 2017. PANOPLY: Low-TCB Linux Applications With SGX Enclaves 2017 Annual Network and Distributed System Security Symposium(NDSS), San Diego, CA."},{"key":"e_1_3_2_1_54_1","volume-title":"A Design and Verification Methodology for Secure Isolated Regions 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM","author":"Sinha Rohit","unstructured":"Rohit Sinha, Manuel Costa, Akash Lal, Nuno Lopes, Sriram Rajamani, Sanjit Seshia, and Kapil Vaswani 2016. A Design and Verification Methodology for Secure Isolated Regions 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM."},{"key":"e_1_3_2_1_55_1","volume-title":"Systematic Fuzzing and Testing of TLS Libraries. ACM SIGSAC Conference on Computer and Communications Security. ACM.","author":"Somorovsky Juraj","year":"2016","unstructured":"Juraj Somorovsky. 2016. Systematic Fuzzing and Testing of TLS Libraries. ACM SIGSAC Conference on Computer and Communications Security. ACM."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_1_57_1","volume-title":"Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable 7th USENIX Symposium on Operating Systems Design and Implementation.","author":"Ta-Min Richard","year":"2006","unstructured":"Richard Ta-Min, Lionel Litty, and David Lie 2006. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable 7th USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_58_1","volume-title":"Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge 2017 IEEE European Symposium on Security and Privacy","author":"Tramer Florian","unstructured":"Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, and Elaine Shi. 2017. Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge 2017 IEEE European Symposium on Security and Privacy. IEEE, 19--34."},{"key":"e_1_3_2_1_59_1","volume-title":"Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald Porter","author":"Tsai Chia-Che","year":"2014","unstructured":"Chia-Che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald Porter 2014. Cooperation and security isolation of library OSes for multi-process applications Ninth European Conference on Computer Systems. ACM."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_35"},{"key":"e_1_3_2_1_61_1","volume-title":"A tool suite for simulation based analysis of memory access behavior International Conference on Computational Science","author":"Weidendorfer Josef","unstructured":"Josef Weidendorfer, Markus Kowarschik, and Carsten Trinitis. 2004. A tool suite for simulation based analysis of memory access behavior International Conference on Computational Science. Springer, 440--447."},{"key":"e_1_3_2_1_62_1","volume-title":"Controlled-channel attacks: Deterministic side channels for untrusted operating systems 2015 IEEE Symposium on Security and Privacy","author":"Xu Yuanzhong","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-channel attacks: Deterministic side channels for untrusted operating systems 2015 IEEE Symposium on Security and Privacy. IEEE, 640--656."},{"key":"e_1_3_2_1_63_1","volume-title":"Using Hypervisor to Provide Data Secrecy for User Applications on a Per-page Basis 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE). ACM","author":"Yang Jisoo","unstructured":"Jisoo Yang and Kang Shin 2008. Using Hypervisor to Provide Data Secrecy for User Applications on a Per-page Basis 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE). ACM."},{"key":"e_1_3_2_1_64_1","volume-title":"2015 IEEE International Symposium on. IEEE, 52--61","author":"Yount Charles","year":"2015","unstructured":"Charles Yount, Harish Patil, Mohammad Islam, and Aditya Srikanth 2015. Graph-matching-based simulation-region selection for multiple binaries Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium on. IEEE, 52--61."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Fan Zhang Ethan Cecchetti Kyle Croman Ari Juels and Elaine Shi 2016. Town crier: An authenticated data feed for smart contracts 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM 270--282.","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_1_67_1","volume-title":"Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 858--870","author":"Zhang Xiaokuan","year":"2016","unstructured":"Xiaokuan Zhang, Yuan Xiao, and Yinqian Zhang. 2016. Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 858--870."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134016","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:27Z","timestamp":1750212807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134016"}},"subtitle":["Differentially Analyzing Side-Channel Traces for Detecting SSL\/TLS Vulnerabilities in Secure Enclaves"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":67,"alternative-id":["10.1145\/3133956.3134016","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134016","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}