{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T03:44:30Z","timestamp":1776743070519,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T00:00:00Z","timestamp":1509148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1145\/3152701.3152706","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":136,"title":["SGX-Step"],"prefix":"10.1145","author":[{"given":"Jo","family":"Van Bulck","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]},{"given":"Raoul","family":"Strackx","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven"}]}],"member":"320","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT '17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software grand exposure: SGX cache attacks are practical . In 11th USENIX Workshop on Offensive Technologies (WOOT '17) . USENIX Association. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies (WOOT '17). USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 25th USENIX Security Symposium. USENIX Association.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation . In Proceedings of the 25th USENIX Security Symposium. USENIX Association. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In Proceedings of the 25th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_4_1","volume-title":"2017 USENIX Annual Technical Conference (ATC '17)","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . 2017 . High-resolution side channels for untrusted operating systems . In 2017 USENIX Annual Technical Conference (ATC '17) . USENIX Association. Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-resolution side channels for untrusted operating systems. In 2017 USENIX Annual Technical Conference (ATC '17). USENIX Association."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel Corporation. 2016. Intel 64 and IA-32 architectures optimization reference manual. Reference no. 248966-033.  Intel Corporation. 2016. Intel 64 and IA-32 architectures optimization reference manual. Reference no. 248966-033."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Corporation. 2017. Intel 64 and IA-32 architectures software developer's manual. Reference no. 325462-062US.  Intel Corporation. 2017. Intel 64 and IA-32 architectures software developer's manual. Reference no. 325462-062US."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel Corporation. 2017. Intel software guard extensions developer guide. software.intel.com\/en-us\/documentation\/sgx-developer-guide.  Intel Corporation. 2017. Intel software guard extensions developer guide. software.intel.com\/en-us\/documentation\/sgx-developer-guide."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. USENIX Association.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In Proceedings of the 26th USENIX Security Symposium. USENIX Association. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In Proceedings of the 26th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_9_1","unstructured":"P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 99 (2017).  P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 99 (2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Samuel Weiser Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2017. Malware guard extension: Using SGX to conceal cache attacks. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA '17).  Michael Schwarz Samuel Weiser Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2017. Malware guard extension: Using SGX to conceal cache attacks. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA '17).","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In Proceedings of the 26th USENIX Security Symposium. USENIX Association. Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In Proceedings of the 26th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","location":"Shanghai China","acronym":"SOSP '17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2nd Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:09Z","timestamp":1750212669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152706"}},"subtitle":["A Practical Attack Framework for Precise Enclave Execution Control"],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":15,"alternative-id":["10.1145\/3152701.3152706","10.1145\/3152701"],"URL":"https:\/\/doi.org\/10.1145\/3152701.3152706","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]},"assertion":[{"value":"2017-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}