{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:45:55Z","timestamp":1772725555850,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379139"],"award-info":[{"award-number":["61379139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["1R01HG007078"],"award-info":[{"award-number":["1R01HG007078"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["12-23967, 13-30491, 14-08944"],"award-info":[{"award-number":["12-23967, 13-30491, 14-08944"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1408874, 1527141, 1566444, 1618493"],"award-info":[{"award-number":["1408874, 1527141, 1566444, 1618493"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1610127"],"award-info":[{"award-number":["W911NF1610127"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134038","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2421-2434","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":219,"title":["Leaky Cauldron on the Dark Land"],"prefix":"10.1145","author":[{"given":"Wenhao","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; Indiana University, Bloomington, Beijing, China"}]},{"given":"Guoxing","family":"Chen","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Xiaorui","family":"Pan","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Bloomington, IN, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Bloomington, IN, USA"}]},{"given":"Vincent","family":"Bindschaedler","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana and Champaign, IL, USA"}]},{"given":"Haixu","family":"Tang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Bloomington, IN, USA"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana and Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Intel Software Guard Extensions Programming Reference. https:\/\/software. intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf\/. (2014). Order Number","year":"2014","unstructured":"2014. Intel Software Guard Extensions Programming Reference. https:\/\/software. intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf\/. (2014). Order Number: 329298-002, October 2014."},{"key":"e_1_3_2_2_2_1","volume-title":"Intel Software Guard Extensions (Intel SGX. https:\/\/software.intel.com\/ sites\/default\/files\/332680-001.pdf. (2015)","year":"2015","unstructured":"2015. Intel Software Guard Extensions (Intel SGX. https:\/\/software.intel.com\/ sites\/default\/files\/332680-001.pdf. (2015). June 2015."},{"key":"e_1_3_2_2_3_1","volume-title":"Combined Volumes:1,2A,2B,2C,3A,3B,3C and 3D. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1-2abcd-3abcd.pdf.","year":"2016","unstructured":"2016. Intel 64 and IA-32 Architectures Software Developer's Manual, Combined Volumes:1,2A,2B,2C,3A,3B,3C and 3D. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1-2abcd-3abcd.pdf. (2016). Order Number: 325462-061US, December 2016."},{"key":"e_1_3_2_2_4_1","volume-title":"Combined Volumes: 1,2A,2B,2C,3A,3B,3C and 3D.","year":"2016","unstructured":"2016. Intel 64 and IA-32 Architectures Software Developer's Manual, Combined Volumes: 1,2A,2B,2C,3A,3B,3C and 3D. (2016). Order Number: 325462-058US April 2016."},{"key":"e_1_3_2_2_5_1","volume-title":"Accessed","author":"Graphene","year":"2017","unstructured":"2017. Graphene \/ Graphene-SGX Library OS - a library OS for Linux multi-process applications, with Intel SGX support. https:\/\/github.com\/oscarlab\/graphene\/. (2017). Accessed May 16, 2017."},{"key":"e_1_3_2_2_6_1","volume-title":"Added","year":"2017","unstructured":"2017. Intel SGX and Side-Channels. https:\/\/software.intel.com\/en-us\/articles\/intel-sgx-and-side-channels. (2017). Added March 26, 2017."},{"key":"e_1_3_2_2_7_1","volume-title":"Accessed","year":"2017","unstructured":"2017. Intel Software Guard Extensions Enclave Writer's Guide. https:\/\/software.intel.com\/sites\/default\/files\/managed\/ae\/48\/Software-Guard-Extensions-Enclave-Writers-Guide.pdf. (2017). Revision 1.02, Accessed May, 2017."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881522"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. 13."},{"key":"e_1_3_2_2_11_1","unstructured":"Haitham Akkary Andy Glew Glenn Hinton. 1997. Method and apparatus for per- forming page table walks in a microprocessor capable of processing speculative instructions. US Patent 5680565 A. (1997)."},{"key":"e_1_3_2_2_12_1","volume-title":"16th International Workshop on Cryptographic Hardware and Embedded Systems.","author":"Benger Naomi","unstructured":"Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. 2014. \"Ooh Aah... Just a Little Bit\": A small amount of side channel can go a long way. In 16th International Workshop on Cryptographic Hardware and Embedded Systems."},{"key":"e_1_3_2_2_13_1","volume-title":"High-speed high-security signatures. Journal of Cryptographic Engineering","author":"Bernstein Daniel J","year":"2012","unstructured":"Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of Cryptographic Engineering (2012), 1--13."},{"key":"e_1_3_2_2_14_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521 (2017)."},{"key":"e_1_3_2_2_15_1","volume-title":"12th ACM Symposium on Information, Computer and Communications Security.","author":"Chen Sanchuan","year":"2017","unstructured":"Sanchuan Chen, Xiaokuan Zhang, Michael Reiter, and Yinqian Zhang. 2017. Detecting Privileged Side-Channel Attacks in Shielded Execution with D \u00c9J\u00c0 13 VU. In 12th ACM Symposium on Information, Computer and Communications Security."},{"key":"e_1_3_2_2_16_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium. USENIX Association.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Johannes G\u00f6tzfried Moritz Eckert Sebastian Schinzel and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX.. In EUROSEC. 2--1.","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_2_18_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches. In 24th USENIX Security Symposium.","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches. In 24th USENIX Security Symposium."},{"key":"e_1_3_2_2_19_1","volume-title":"32nd IEEE Symposium on Security and Privacy.","author":"Gullasch D.","unstructured":"D. Gullasch, E. Bangerter, and S. Krenn. 2011. Cache games -- Bringing access- based cache attacks on AES to practice. In 32nd IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_20_1","volume-title":"High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA, 299--312."},{"key":"e_1_3_2_2_21_1","volume-title":"Practical Timing Side Channel Attacks Against Kernel Space ASLR. In 34th IEEE Symposium on Security and Privacy.","author":"Hund Ralf","year":"2013","unstructured":"Ralf Hund, Carsten Willems, and Thorsten Holz. 2013. Practical Timing Side Channel Attacks Against Kernel Space ASLR. In 34th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_22_1","unstructured":"Mehmet Sinan Inci Berk Gulmezoglu Gorka Irazoqui Thomas Eisenbarth and Berk Sunar. 2015. Seriously get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. Cryptology ePrint Archive. (2015)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.56"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897962"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_2_28_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC."},{"key":"e_1_3_2_2_29_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium .","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_30_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Liu Fangfei","unstructured":"Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last- Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_31_1","volume-title":"Cachezoom: How SGX amplifies the power of cache attacks. arXiv preprint arXiv:1703.06986","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. Cachezoom: How SGX amplifies the power of cache attacks. arXiv preprint arXiv:1703.06986 (2017)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74462-7_11"},{"key":"e_1_3_2_2_33_1","volume-title":"The Spy in the Sandbox: Practical Cache Attacks in JavaScript and Their Implications. In 22nd ACM SIGSAC Conference on Computer and Communications Security.","author":"Oren Yossef","unstructured":"Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, and Angelos D. Keromytis. 2015. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and Their Implications. In 22nd ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_34_1","volume-title":"6th Cryptographers' track at the RSA conference on Topics in Cryptology.","author":"Osvik Dag Arne","unstructured":"Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and counter measures: the case of AES. In 6th Cryptographers' track at the RSA conference on Topics in Cryptology."},{"key":"e_1_3_2_2_35_1","volume-title":"BSDCon","author":"Percival Colin","year":"2005","unstructured":"Colin Percival. 2005. Cache Missing for Fun and Profit. In BSDCon 2005."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 25th USENIX Security Symposium.","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl, Daniel Gruss, Clementine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In Proceedings of the 25th USENIX Security Symposium."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"e_1_3_2_2_38_1","volume-title":"Proceed- ings of the 2017 Annual Network and Distributed System Security Symposium (NDSS).","author":"Shih Ming-Wei","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Proceed- ings of the 2017 Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592812"},{"key":"e_1_3_2_2_42_1","volume-title":"One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium.","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium."},{"key":"e_1_3_2_2_43_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 36th IEEE Symposium on Security and Privacy.","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 36th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_44_1","unstructured":"Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. In Cryptology ePrint Archive."},{"key":"e_1_3_2_2_45_1","volume-title":"USENIX Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack. In USENIX Security Symposium."},{"key":"e_1_3_2_2_46_1","volume-title":"Return-Oriented Flush- Reload Side Channels on ARM and Their Implications for Android Devices. In ACM Conference on Computer and Communications Security.","author":"Zhang Xiaokuan","year":"2016","unstructured":"Xiaokuan Zhang, Yuan Xiao, and Yinqian Zhang. 2016. Return-Oriented Flush- Reload Side Channels on ARM and Their Implications for Android Devices. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134038","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134038"}},"subtitle":["Understanding Memory Side-Channel Hazards in SGX"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":48,"alternative-id":["10.1145\/3133956.3134038","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134038","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}