{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:34Z","timestamp":1750221274063,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T00:00:00Z","timestamp":1509148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1145\/3152701.3152708","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Strongly Secure and Efficient Data Shuffle on Hardware Enclaves"],"prefix":"10.1145","author":[{"given":"Ju","family":"Chen","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]},{"given":"Yuzhe (Richard)","family":"Tang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]}],"member":"320","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM TrustZone http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/.  ARM TrustZone http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Google cloud platform supports intel sgx.  Google cloud platform supports intel sgx."},{"key":"e_1_3_2_1_3_1","unstructured":"IBM SCPU http:\/\/www-03.ibm.com\/security\/cryptocards\/.  IBM SCPU http:\/\/www-03.ibm.com\/security\/cryptocards\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel corp. software guard extensions programming reference.  Intel corp. software guard extensions programming reference."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel TXT http:\/\/www.intel.com\/technology\/security\/downloads\/trustedexec_overview.pdf.  Intel TXT http:\/\/www.intel.com\/technology\/security\/downloads\/trustedexec_overview.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel's transactional synchronization extensions (intel's tsx) overview.  Intel's transactional synchronization extensions (intel's tsx) overview."},{"key":"e_1_3_2_1_7_1","unstructured":"Introducing azure confidential computing.  Introducing azure confidential computing."},{"key":"e_1_3_2_1_8_1","unstructured":"TPM http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/.  TPM http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/."},{"volume-title":"IEEE Symposium on Security and Privacy, SP 2015","year":"2015","key":"e_1_3_2_1_9_1","unstructured":"2015 IEEE Symposium on Security and Privacy, SP 2015 , San Jose, CA, USA , May 17-21, 2015 . IEEE Computer Society, 2015. 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015. IEEE Computer Society, 2015."},{"key":"e_1_3_2_1_10_1","first-page":"53","volume-title":"Holz and Savage {17}","author":"Almeida J. B.","unstructured":"J. B. Almeida , M. Barbosa , G. Barthe , F. Dupressoir , and M. Emmi . Verifying constant-time implementations . In Holz and Savage {17} , pages 53 -- 70 . J. B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir, and M. Emmi. Verifying constant-time implementations. In Holz and Savage {17}, pages 53--70."},{"key":"e_1_3_2_1_11_1","unstructured":"I. Anati S. Gueron S. P. Johnson and V. R. Scarlata. Innovative technology for cpu based attestation and sealing.  I. Anati S. Gueron S. P. Johnson and V. R. Scarlata. Innovative technology for cpu based attestation and sealing."},{"key":"e_1_3_2_1_12_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Bulck J. V.","year":"2017","unstructured":"J. V. Bulck , N. Weichbrodt , R. Kapitza , F. Piessens , and R. Strackx . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC , 2017 . USENIX Association. J. V. Bulck, N. Weichbrodt, R. Kapitza, F. Piessens, and R. Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, 2017. USENIX Association."},{"key":"e_1_3_2_1_13_1","first-page":"86","volume":"2016","author":"Costan V","year":"2016","unstructured":"V Costan and S. Devadas . Intel SGX explained. IACR Cryptology ePrint Archive , 2016 : 86 , 2016 . V Costan and S. Devadas. Intel SGX explained. IACR Cryptology ePrint Archive, 2016:86, 2016.","journal-title":"Intel SGX explained. IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23125"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_1_17_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Holz T.","year":"2016","unstructured":"T. Holz and S. Savage , editors . 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016 . USENIX Association, 2016. T. Holz and S. Savage, editors. 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1206501"},{"key":"e_1_3_2_1_19_1","volume-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing. CoRR, abs\/1611.06952","author":"Lee S.","year":"2016","unstructured":"S. Lee , M. Shih , P. Gera , T. Kim , H. Kim , and M. Peinado . Inferring fine-grained control flow inside SGX enclaves with branch shadowing. CoRR, abs\/1611.06952 , 2016 . S. Lee, M. Shih, P. Gera, T. Kim, H. Kim, and M. Peinado. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. CoRR, abs\/1611.06952, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_22_1","first-page":"556","volume-title":"41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II","author":"Ohrimenko O.","year":"2014","unstructured":"O. Ohrimenko , M. T. Goodrich , R. Tamassia , and E. Upfal . The melbourne shuffle: Improving oblivious storage in the cloud. In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II , pages 556 -- 567 , 2014 . O. Ohrimenko, M. T. Goodrich, R. Tamassia, and E. Upfal. The melbourne shuffle: Improving oblivious storage in the cloud. In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II, pages 556--567, 2014."},{"key":"e_1_3_2_1_23_1","first-page":"619","volume-title":"Holz and Savage {17}","author":"Ohrimenko O.","unstructured":"O. Ohrimenko , F. Schuster , C. Fournet , A. Mehta , S. Nowozin , K. Vaswani , and M. Costa . Oblivious multi-party machine learning on trusted processors . In Holz and Savage {17} , pages 619 -- 636 . O. Ohrimenko, F. Schuster, C. Fournet, A. Mehta, S. Nowozin, K. Vaswani, and M. Costa. Oblivious multi-party machine learning on trusted processors. In Holz and Savage {17}, pages 619--636."},{"key":"e_1_3_2_1_24_1","volume-title":"T-sgx: Eradicating controlled-channel attacks against enclave programs","author":"Shih M.-W.","year":"2017","unstructured":"M.-W. Shih , S. Lee , T. Kim , and M. Peinado . T-sgx: Eradicating controlled-channel attacks against enclave programs . 2017 . M.-W. Shih, S. Lee, T. Kim, and M. Peinado. T-sgx: Eradicating controlled-channel attacks against enclave programs. 2017."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_28_1","first-page":"283","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Zheng W.","year":"2017","unstructured":"W. Zheng , A. Dave , J. G. Beekman , R. A. Popa , J. E. Gonzalez , and I. Stoica . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017 , Boston, MA, USA , March 27-29, 2017 , pages 283 -- 298 , 2017. W. Zheng, A. Dave, J. G. Beekman, R. A. Popa, J. E. Gonzalez, and I. Stoica. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017, pages 283--298, 2017."}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Shanghai China","acronym":"SOSP '17"},"container-title":["Proceedings of the 2nd Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:09Z","timestamp":1750212669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":28,"alternative-id":["10.1145\/3152701.3152708","10.1145\/3152701"],"URL":"https:\/\/doi.org\/10.1145\/3152701.3152708","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]},"assertion":[{"value":"2017-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}