{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:18Z","timestamp":1755838698871,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008332","name":"Technische Universit\u00e4t Graz","doi-asserted-by":"publisher","award":["DEPENDABLETHINGS"],"award-info":[{"award-number":["DEPENDABLETHINGS"]}],"id":[{"id":"10.13039\/100008332","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["681402"],"award-info":[{"award-number":["681402"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["DeSSnet"],"award-info":[{"award-number":["DeSSnet"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196524","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"575-586","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Single Trace Attack Against RSA Key Generation in Intel SGX SSL"],"prefix":"10.1145","author":[{"given":"Samuel","family":"Weiser","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Raphael","family":"Spreitzer","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Lukas","family":"Bodner","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"volume-title":"Cryptography and Coding -- IMA 2007 (LNCS)","author":"Acii\u00e7mez Onur","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"volume-title":"Topics in Cryptology -- CT-RSA 2008 (LNCS)","author":"Acii\u00e7mez Onur","key":"e_1_3_2_1_4_1"},{"volume-title":"Communication System Software and Middleware -- COMSWARE","year":"2007","author":"Aravamuthan Sarang","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-131Ar1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_13"},{"key":"e_1_3_2_1_8_1","unstructured":"Daniel J. Bernstein. 2005. Cache-Timing Attacks on AES. Available online at http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf. (April 2005).  Daniel J. Bernstein. 2005. Cache-Timing Attacks on AES. Available online at http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf. (April 2005)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein Joachim Breitner Daniel Genkin Leon Groot Bruinderink Nadia Heninger Tanja Lange Christine van Vredendaal and Yuval Yarom. 2017. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. In Cryptographic Hardware and Embedded Systems -- CHES 2017 (LNCS) Vol. 10529. Springer 555-- 576.  Daniel J. Bernstein Joachim Breitner Daniel Genkin Leon Groot Bruinderink Nadia Heninger Tanja Lange Christine van Vredendaal and Yuval Yarom. 2017. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. In Cryptographic Hardware and Embedded Systems -- CHES 2017 (LNCS) Vol. 10529. Springer 555-- 576.","DOI":"10.1007\/978-3-319-66787-4_27"},{"key":"e_1_3_2_1_10_1","first-page":"203","article-title":"Twenty Years of Attacks on the RSA Cryptosystem","volume":"46","author":"Boneh Dan","year":"1999","journal-title":"Notices of the American Mathematical Society (AMS)"},{"volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In Workshop on Offensive Technologies -- WOOT","year":"2017","author":"Brasser Ferdinand","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"volume-title":"USENIX Security Symposium","year":"2017","author":"Bulck Jo Van","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel Corporation. 2017. Intel Software Guard Extensions Developer Guide. https:\/\/software.intel.com\/en-us\/sgx-sdk\/documentation. (2017).  Intel Corporation. 2017. Intel Software Guard Extensions Developer Guide. https:\/\/software.intel.com\/en-us\/sgx-sdk\/documentation. (2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Corporation. 2017. Intel Software Guard Extensions (Intel SGX). https: \/\/software.intel.com\/en-us\/sgx. (2017).  Intel Corporation. 2017. Intel Software Guard Extensions (Intel SGX). https: \/\/software.intel.com\/en-us\/sgx. (2017)."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel Corporation. 2017. Using the Intel Software Guard Extensions (Intel SGX) SSL Library. https:\/\/software.intel.com\/en-us\/sgx\/resource-library. (2017).  Intel Corporation. 2017. Using the Intel Software Guard Extensions (Intel SGX) SSL Library. https:\/\/software.intel.com\/en-us\/sgx\/resource-library. (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_11"},{"key":"e_1_3_2_1_20_1","unstructured":"OpenSSL Software Foundation. 2017. OpenSSL -- Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/. (2017).  OpenSSL Software Foundation. 2017. OpenSSL -- Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/. (2017)."},{"volume-title":"Recent Advances in Intrusion Detection -- RAID 2017 (LNCS)","author":"Fu Yangchun","key":"e_1_3_2_1_21_1"},{"volume-title":"Constant-Time Callees with Variable-Time Callers. In USENIX Security Symposium","year":"2017","author":"Garc\u00eda Cesar Pereida","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Qian Ge Yuval Yarom David Cock and Gernot Heiser. 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering (2016) 1--27.  Qian Ge Yuval Yarom David Cock and Gernot Heiser. 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering (2016) 1--27.","DOI":"10.1007\/s13389-016-0141-6"},{"volume-title":"Embedded Systems and Communications Security -- ECSC","year":"2009","author":"Gopal Vinodh","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0031-5"},{"volume-title":"High-Resolution Side Channels for Untrusted Operating Systems. In USENIX Annual Technical Conference -- USENIX ATC","year":"2017","author":"H\u00e4hnel Marcus","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_29_1","unstructured":"American National Standards Institute. 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). (1998).  American National Standards Institute. 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). (1998)."},{"volume-title":"Advances in Cryptology -- CRYPTO 1996 (LNCS)","author":"Kocher Paul C.","key":"e_1_3_2_1_30_1"},{"volume-title":"Topics in Cryptology -- CT-RSA 2008 (LNCS)","author":"K\u00f6nighofer Robert","key":"e_1_3_2_1_31_1"},{"volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium","year":"2017","author":"Lee Sangho","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_34_1","unstructured":"Alfred Menezes Paul C. van Oorschot and Scott A. Vanstone. 1996. Handbook of Applied Cryptography. CRC Press.   Alfred Menezes Paul C. van Oorschot and Scott A. Vanstone. 1996. Handbook of Applied Cryptography. CRC Press."},{"volume-title":"Cryptographic Hardware and Embedded Systems -- CHES 2017 (LNCS)","author":"Moghimi Ahmad","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Elaine Barker (NIST). 2016. Recommendation for Key Management Part 1: General. (2016).  Elaine Barker (NIST). 2016. Recommendation for Key Management Part 1: General. (2016).","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"e_1_3_2_1_37_1","unstructured":"Colin Percival. 2005. Cache Missing for Fun and Profit. http:\/\/daemonology.net\/ hyperthreading-considered-harmful\/. (2005).  Colin Percival. 2005. Cache Missing for Fun and Profit. http:\/\/daemonology.net\/ hyperthreading-considered-harmful\/. (2005)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"volume-title":"Detection of Intrusions and Malware &Vulnerability Assessment -- DIMVA 2017 (LNCS)","author":"Schwarz Michael","key":"e_1_3_2_1_39_1"},{"volume-title":"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In Network and Distributed System Security Symposium -- NDSS","year":"2017","author":"Seo Jaebaek","key":"e_1_3_2_1_40_1"},{"volume-title":"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium -- NDSS","year":"2017","author":"Shih Ming-Wi","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","unstructured":"Shweta Shinde Zheng Leong Chua Viswesh Narayanan and Prateek Saxena. 2015. Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks. arXiv ePrint Archive Report 1506.04832 (2015).  Shweta Shinde Zheng Leong Chua Viswesh Narayanan and Prateek Saxena. 2015. Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks. arXiv ePrint Archive Report 1506.04832 (2015)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9991(67)90047-2"},{"volume-title":"USENIX Security Symposium","year":"2016","author":"Strackx Raoul","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Raoul Strackx and Frank Piessens. 2017. The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs\/1712.08519 (2017).  Raoul Strackx and Frank Piessens. 2017. The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs\/1712.08519 (2017)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2724966.2725064"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_9"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"volume-title":"USENIX Security Symposium","year":"2014","author":"Yarom Yuval","key":"e_1_3_2_1_52_1"},{"volume-title":"Cryptographic Hardware and Embedded Systems -- CHES 2016 (LNCS)","author":"Yarom Yuval","key":"e_1_3_2_1_53_1"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":53,"alternative-id":["10.1145\/3196494.3196524","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196524","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}