{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T00:14:40Z","timestamp":1777421680434,"version":"3.51.4"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T00:00:00Z","timestamp":1512000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1228843,CCF-1333594,CNS-1618563"],"award-info":[{"award-number":["CNS-1228843,CCF-1333594,CNS-1618563"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2017,11,30]]},"abstract":"<jats:p>\n            Users of modern data-processing services such as tax preparation or genomic screening are forced to trust them with data that the users wish to keep secret. Ryoan\n            <jats:sup>1<\/jats:sup>\n            protects secret data while it is processed by services that the data owner does not trust. Accomplishing this goal in a distributed setting is difficult, because the user has no control over the service providers or the computational platform. Confining code to prevent it from leaking secrets is notoriously difficult, but Ryoan benefits from new hardware and a request-oriented data model.\n          <\/jats:p>\n          <jats:p>Ryoan provides a distributed sandbox, leveraging hardware enclaves (e.g., Intel\u2019s software guard extensions (SGX) [40]) to protect sandbox instances from potentially malicious computing platforms. The protected sandbox instances confine untrusted data-processing modules to prevent leakage of the user\u2019s input data. Ryoan is designed for a request-oriented data model, where confined modules only process input once and do not persist state about the input. We present the design and prototype implementation of Ryoan and evaluate it on a series of challenging problems including email filtering, health analysis, image processing and machine translation.<\/jats:p>","DOI":"10.1145\/3231594","type":"journal-article","created":{"date-parts":[[2018,12,17]],"date-time":"2018-12-17T13:17:16Z","timestamp":1545052636000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["Ryoan"],"prefix":"10.1145","volume":"35","author":[{"given":"Tyler","family":"Hunt","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]},{"given":"Zhiting","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]},{"given":"Yuanzhong","family":"Xu","sequence":"additional","affiliation":[{"name":"Google, CA, United States"}]},{"given":"Simon","family":"Peter","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]},{"given":"Emmett","family":"Witchel","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2018,12,16]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"23andMe Compares Family History and Genetic Tests for Predicting Complex Disease Risk. Retrieved","author":"Me.","year":"2016","unstructured":"23and Me. 2016. 23andMe Compares Family History and Genetic Tests for Predicting Complex Disease Risk. Retrieved September 2016 from http:\/\/mediacenter.23andme.com\/blog\/23andme-compares-family-history-and-genetic-tests-for-predicting-complex-disease-risk\/. 23andMe. 2016. 23andMe Compares Family History and Genetic Tests for Predicting Complex Disease Risk. Retrieved September 2016 from http:\/\/mediacenter.23andme.com\/blog\/23andme-compares-family-history-and-genetic-tests-for-predicting-complex-disease-risk\/."},{"key":"e_1_2_1_2_1","volume-title":"Retrieved","author":"ACL.","year":"2013","unstructured":"ACL. 2013 . Shared Task: Machine Translation . Retrieved August 23, 2018 from http:\/\/www.statmt.org\/wmt13\/translation-task.html. ACL. 2013. Shared Task: Machine Translation. Retrieved August 23, 2018 from http:\/\/www.statmt.org\/wmt13\/translation-task.html."},{"key":"e_1_2_1_3_1","volume-title":"Retrieved","year":"2016","unstructured":"Amazon. 2016 . Amazon Machine Learning . Retrieved August 23, 2018 from https:\/\/aws.amazon.com\/machine-learning\/. Amazon. 2016. Amazon Machine Learning. Retrieved August 23, 2018 from https:\/\/aws.amazon.com\/machine-learning\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.22"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O\u2019Keeffe , Mark L. Stillwell , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure linux containers with intel SGX . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916) . USENIX Association, Berkeley, CA, 689--703. http:\/\/dl.acm.org\/citation.cfm?id&equals;3026877.3026930 Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O\u2019Keeffe, Mark L. Stillwell, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure linux containers with intel SGX. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916). USENIX Association, Berkeley, CA, 689--703. http:\/\/dl.acm.org\/citation.cfm?id&equals;3026877.3026930"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_2_1_8_1","volume-title":"Advances in Cryptology: EUROCRYPT","author":"Boldyreva Alexandra","year":"2009","unstructured":"Alexandra Boldyreva , Nathan Chenette , Younho Lee , and Adam O\u2019Neill . 2009. Order-preserving symmetric encryption . In Advances in Cryptology: EUROCRYPT 2009 , Antoine Joux (Ed.). Springer , Berlin, 224--241. Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O\u2019Neill. 2009. Order-preserving symmetric encryption. In Advances in Cryptology: EUROCRYPT 2009, Antoine Joux (Ed.). Springer, Berlin, 224--241."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_2_1_10_1","volume-title":"Retrieved","author":"Bottou L\u00e8on","year":"2016","unstructured":"L\u00e8on Bottou . 2016 . Stochastic Gradient SVM . Retrieved August 23, 2018 from http:\/\/leon.bottou.org\/projects\/sgd#stochastic_gradient_svm. L\u00e8on Bottou. 2016. Stochastic Gradient SVM. Retrieved August 23, 2018 from http:\/\/leon.bottou.org\/projects\/sgd#stochastic_gradient_svm."},{"key":"e_1_2_1_11_1","volume-title":"Advances in Cryptology: CRYPTO","author":"Brakerski Zvika","year":"2011","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan . 2011. Fully homomorphic encryption from ring-LWE and security for key dependent messages . In Advances in Cryptology: CRYPTO 2011 , Phillip Rogaway (Ed.). Springer , Berlin, 505--524. Zvika Brakerski and Vinod Vaikuntanathan. 2011. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Advances in Cryptology: CRYPTO 2011, Phillip Rogaway (Ed.). Springer, Berlin, 505--524."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908) . USENIX Association, Berkeley, CA, 209--224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908). USENIX Association, Berkeley, CA, 209--224."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_2_1_15_1","volume-title":"Lai","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H . Lai . 2018 . SgxPectre attacks: Leaking enclave secrets via speculative execution. arxiv:1802.09085. Retrieved from https:\/\/arxiv.org\/abs\/1802.09085 Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2018. SgxPectre attacks: Leaking enclave secrets via speculative execution. arxiv:1802.09085. Retrieved from https:\/\/arxiv.org\/abs\/1802.09085"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 13th USENIX Security Symposium (USENIX Security\u201904)","author":"Chow Jim","year":"2004","unstructured":"Jim Chow , Ben Pfaff , Tal Garfinkel , Kevin Christopher , and Mendel Rosenblum . 2004 . Understanding data lifetime via whole system simulation . In Proceedings of the 13th USENIX Security Symposium (USENIX Security\u201904) . USENIX Association, Berkeley, CA, 321--336. Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. 2004. Understanding data lifetime via whole system simulation. In Proceedings of the 13th USENIX Security Symposium (USENIX Security\u201904). USENIX Association, Berkeley, CA, 321--336."},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","year":"2016","unstructured":"Clarifai. 2016 . Clarifai . Retrieved August 23, 2018 from https:\/\/www.clarifai.com Clarifai. 2016. Clarifai. Retrieved August 23, 2018 from https:\/\/www.clarifai.com"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_2_1_21_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086.pdf  Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation . In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916) . USENIX Association, Berkeley, CA, 857--874. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916). USENIX Association, Berkeley, CA, 857--874."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_2_1_24_1","volume-title":"CSMINING Group: Spam Email Datasets. Retrieved","author":"CSMINING Group","year":"2016","unstructured":"CSMINING Group . 2016. CSMINING Group: Spam Email Datasets. Retrieved April 2016 from https:\/\/csmining.org\/index.php\/spam-email-datasets-.html. CSMINING Group. 2016. CSMINING Group: Spam Email Datasets. Retrieved April 2016 from https:\/\/csmining.org\/index.php\/spam-email-datasets-.html."},{"key":"e_1_2_1_25_1","volume-title":"return-to-libc","author":"Designer Solar","unstructured":"Solar Designer . 1997. \u201c return-to-libc \u201d attack. Bugtraq . Solar Designer. 1997. \u201creturn-to-libc\u201d attack. Bugtraq."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201916)","author":"Ferraiuolo Andrew","unstructured":"Andrew Ferraiuolo , Yao Wang , Danfeng Zhang , Andrew C. Myers , and G. Edward Suh . 2016. Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller . In Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201916) . 382--393. Andrew Ferraiuolo, Yao Wang, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh. 2016. Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller. In Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201916). 382--393."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u201912)","author":"Ford Bryan","year":"2012","unstructured":"Bryan Ford . 2012 . Plugging side-channel leaks with timing information flow control . In Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u201912) . USENIX Association, Berkeley, CA, 24--24. Bryan Ford. 2012. Plugging side-channel leaks with timing information flow control. In Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u201912). USENIX Association, Berkeley, CA, 24--24."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 2002 Ottawa Linux Symposium. 479--495","author":"Franke Hubertus","year":"2002","unstructured":"Hubertus Franke , Rusty Russell , and Matthew Kirkwood . 2002 . Fuss, futexes and furwocks: Fast userlevel locking in linux . In Proceedings of the 2002 Ottawa Linux Symposium. 479--495 . Hubertus Franke, Rusty Russell, and Matthew Kirkwood. 2002. Fuss, futexes and furwocks: Fast userlevel locking in linux. In Proceedings of the 2002 Ottawa Linux Symposium. 479--495."},{"key":"e_1_2_1_32_1","volume-title":"Implementation and safety of NaCl SFI for x86-64. Retrieved","year":"2016","unstructured":"Google. 2016. Implementation and safety of NaCl SFI for x86-64. Retrieved September 2016 from https:\/\/groups.google.com\/forum\/#&excl;topic\/native-client-discuss\/C-wXFdR2lf8. Google. 2016. Implementation and safety of NaCl SFI for x86-64. Retrieved September 2016 from https:\/\/groups.google.com\/forum\/#&excl;topic\/native-client-discuss\/C-wXFdR2lf8."},{"key":"e_1_2_1_33_1","volume-title":"Retrieved","author":"GRIB\/IMIM\/UPF Integrative Biomedical Informatics Group","year":"2016","unstructured":"GRIB\/IMIM\/UPF Integrative Biomedical Informatics Group . 2016 . The DisGeNET Database . Retrieved February, 2016 from http:\/\/www.disgenet.org\/ds\/DisGeNET\/files\/current\/DisGeNET_2016.db.gz. GRIB\/IMIM\/UPF Integrative Biomedical Informatics Group. 2016. The DisGeNET Database. Retrieved February, 2016 from http:\/\/www.disgenet.org\/ds\/DisGeNET\/files\/current\/DisGeNET_2016.db.gz."},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"The Radicati Group","year":"2009","unstructured":"The Radicati Group . 2009 . The Radicati Group, Inc: Email Statistics Report 2009--2013 (summary) . Retrieved August 23, 2018 from http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2009\/05\/email-stats-report-exec-summary.pdf. The Radicati Group. 2009. The Radicati Group, Inc: Email Statistics Report 2009--2013 (summary). Retrieved August 23, 2018 from http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2009\/05\/email-stats-report-exec-summary.pdf."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103007"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Hawblitzel Chris","year":"2014","unstructured":"Chris Hawblitzel , Jon Howell , Jacob R. Lorch , Arjun Narayan , Bryan Parno , Danfeng Zhang , and Brian Zill . 2014 . Ironclad apps: End-to-end security via automated full-system verification . In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914) . USENIX Association, Berkeley, CA, 165--181. Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, and Brian Zill. 2014. Ironclad apps: End-to-end security via automated full-system verification. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). USENIX Association, Berkeley, CA, 165--181."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Hunt Tyler","year":"2016","unstructured":"Tyler Hunt , Zhiting Zhu , Yuanzhong Xu , Simon Peter , and Emmett Witchel . 2016 . Ryoan: A distributed sandbox for untrusted computation on secret data . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916) . USENIX Association, Berkeley, CA, 533--549. Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. 2016. Ryoan: A distributed sandbox for untrusted computation on secret data. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916). USENIX Association, Berkeley, CA, 533--549."},{"key":"e_1_2_1_39_1","volume-title":"Retrieved","author":"IBM.","year":"2016","unstructured":"IBM. 2016 . IBM Visual Recognition service . Retrieved August 23, 2018 from http:\/\/www.ibm.com\/smarterplanet\/us\/en\/ibmwatson\/developercloud\/visual-recognition.html. IBM. 2016. IBM Visual Recognition service. Retrieved August 23, 2018 from http:\/\/www.ibm.com\/smarterplanet\/us\/en\/ibmwatson\/developercloud\/visual-recognition.html."},{"key":"e_1_2_1_40_1","unstructured":"Intel. 2014. Intel Software Guard Extensions Programming Reference. Retrieved August 23 2018 from https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf.  Intel. 2014. Intel Software Guard Extensions Programming Reference. Retrieved August 23 2018 from https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_2_1_41_1","volume-title":"Retrieved","year":"2015","unstructured":"Intel. 2015 . Intel Software Guard Extensions Evaluation SDK Users Guide: Diffie-Hellman Key Exchange . Retrieved August 23, 2018 from https:\/\/software.intel.com\/sites\/products\/sgx-sdk-users-guide-windows\/Default.htm. Intel. 2015. Intel Software Guard Extensions Evaluation SDK Users Guide: Diffie-Hellman Key Exchange. Retrieved August 23, 2018 from https:\/\/software.intel.com\/sites\/products\/sgx-sdk-users-guide-windows\/Default.htm."},{"key":"e_1_2_1_42_1","unstructured":"Intel. 2016. Intel Software Guard Extensions for Linux OS: linux-sgx. https:\/\/github.com\/01org\/linux-sgx. (commit:d686fb0).  Intel. 2016. Intel Software Guard Extensions for Linux OS: linux-sgx. https:\/\/github.com\/01org\/linux-sgx. (commit:d686fb0)."},{"key":"e_1_2_1_43_1","unstructured":"Intel. 2016. Intel Software Guard Extensions for Linux OS: linux-sgx-driver. https:\/\/github.com\/01org\/linux-sgx-driver. (commit:0fb8995).  Intel. 2016. Intel Software Guard Extensions for Linux OS: linux-sgx-driver. https:\/\/github.com\/01org\/linux-sgx-driver. (commit:0fb8995)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23011"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS\u201911)","author":"Kang Min Gyung","year":"2011","unstructured":"Min Gyung Kang , Stephen McCamant , Pongsin Poosankam , and Dawn Song . 2011 . DTA++: Dynamic taint analysis with targeted control-flow propagation . In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS\u201911) . Internet Society. Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song. 2011. DTA++: Dynamic taint analysis with targeted control-flow propagation. In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS\u201911). Internet Society."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.19"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 21st USENIX Security Symposium (USENIX Security\u201912)","author":"Kim Taesoo","year":"2012","unstructured":"Taesoo Kim , Marcus Peinado , and Gloria Mainar-Ruiz . 2012 . STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud . In Proceedings of the 21st USENIX Security Symposium (USENIX Security\u201912) . USENIX Association, Berkeley, CA. Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud. In Proceedings of the 21st USENIX Security Symposium (USENIX Security\u201912). USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_48_1","unstructured":"Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. arxiv:1801.01203. Retrieved from https:\/\/arxiv.org\/abs\/1801.01203  Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. arxiv:1801.01203. Retrieved from https:\/\/arxiv.org\/abs\/1801.01203"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872372"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917) . USENIX Association, Berkeley, CA, 557--574. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917). USENIX Association, Berkeley, CA, 557--574."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541947"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201914)","author":"Li Yanlin","year":"2014","unstructured":"Yanlin Li , Jonathan McCune , James Newsome , Adrian Perrig , Brandon Baker , and Will Drewry . 2014 . MiniBox: A two-way sandbox for x86 native code . In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201914) . USENIX Association, Berkeley, CA, 409--420. http:\/\/dl.acm.org\/citation.cfm?id&equals;2643634.2643676 Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry. 2014. MiniBox: A two-way sandbox for x86 native code. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201914). USENIX Association, Berkeley, CA, 409--420. http:\/\/dl.acm.org\/citation.cfm?id&equals;2643634.2643676"},{"key":"e_1_2_1_55_1","volume-title":"libsodium: A modern and easy-to-use crypto library. Retrieved","year":"2016","unstructured":"libsodium. 2016. libsodium: A modern and easy-to-use crypto library. Retrieved September 2016 from https:\/\/github.com\/jedisct1\/libsodium. libsodium. 2016. libsodium: A modern and easy-to-use crypto library. Retrieved September 2016 from https:\/\/github.com\/jedisct1\/libsodium."},{"key":"e_1_2_1_56_1","unstructured":"ARM Limited. 2009. Building a Secure System using TrustZone Technology. Ref. PRD29-GENC-009492C.  ARM Limited. 2009. Building a Secure System using TrustZone Technology. Ref. PRD29-GENC-009492C."},{"key":"e_1_2_1_57_1","unstructured":"Moritz Lipp Michael Schwarz Daniel Gruss Thomas Prescher Werner Haas Stefan Mangard Paul Kocher Dkaniel Genkin Yuval Yarom and Mike Hamburg. 2018. Meltdown. arxiv:1801.01207. Retrieved from https:\/\/arxiv.org\/abs\/1801.01207  Moritz Lipp Michael Schwarz Daniel Gruss Thomas Prescher Werner Haas Stefan Mangard Paul Kocher Dkaniel Genkin Yuval Yarom and Mike Hamburg. 2018. Meltdown. arxiv:1801.01207. Retrieved from https:\/\/arxiv.org\/abs\/1801.01207"},{"key":"e_1_2_1_58_1","volume-title":"Advances in Digital Forensics IX","author":"Liu Anyi","unstructured":"Anyi Liu , Jim Chen , and Harry Wechsler . 2013. Real-time covert timing channel detection in networked virtual environments . In Advances in Digital Forensics IX , Gilbert Peterson and Sujeet Shenoi (Eds.). Springer , Berlin , 273--288. Anyi Liu, Jim Chen, and Harry Wechsler. 2013. Real-time covert timing channel detection in networked virtual environments. In Advances in Digital Forensics IX, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer, Berlin, 273--288."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2768566.2768570"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_2_1_62_1","volume-title":"Retrieved","author":"Mahadeokar Jay","year":"2016","unstructured":"Jay Mahadeokar and Gerry Pesavento . 2016 . Open Sourcing a Deep Learning Solution for Detecting NSFW Images . Retrieved August 24, 2018 from https:\/\/yahooeng.tumblr.com\/post\/151148689421\/open-sourcing-a-deep-learning-solution-for. Jay Mahadeokar and Gerry Pesavento. 2016. Open Sourcing a Deep Learning Solution for Detecting NSFW Images. Retrieved August 24, 2018 from https:\/\/yahooeng.tumblr.com\/post\/151148689421\/open-sourcing-a-deep-learning-solution-for."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . 2017 . ROTE: Rollback protection for trusted execution . In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917) . USENIX Association, Berkeley, CA, 1289--1306. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback protection for trusted execution. In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917). USENIX Association, Berkeley, CA, 1289--1306."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_2_1_65_1","volume-title":"McGrew and John Viega","author":"David","year":"2005","unstructured":"David A. McGrew and John Viega . 2005 . The Galois\/Counter Mode of Operation (GCM). Retrieved September 2016 from http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/gcm\/gcm-revised-spec.pdf. David A. McGrew and John Viega. 2005. The Galois\/Counter Mode of Operation (GCM). Retrieved September 2016 from http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/gcm\/gcm-revised-spec.pdf."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_2_1_67_1","volume-title":"Retrieved","year":"2016","unstructured":"Moses. 2016 . Moses Statistical Machine Learning Translation System . Retrieved August 23, 2018 from http:\/\/www.statmt.org\/moses\/. Moses. 2016. Moses Statistical Machine Learning Translation System. Retrieved August 23, 2018 from http:\/\/www.statmt.org\/moses\/."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241143"},{"key":"e_1_2_1_71_1","unstructured":"Dan O\u2019Keeffe Divya Muthukumaran Pierre-Louis Aublin Florian Kelbert Christian Priebe Josh Lind Huanzhou Zhu and Peter Pietzuch. 2018. spectre-attack-sgx. Retrieved from https:\/\/github.com\/lsds\/spectre-attack-sgx.  Dan O\u2019Keeffe Divya Muthukumaran Pierre-Louis Aublin Florian Kelbert Christian Priebe Josh Lind Huanzhou Zhu and Peter Pietzuch. 2018. spectre-attack-sgx. Retrieved from https:\/\/github.com\/lsds\/spectre-attack-sgx."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638548"},{"key":"e_1_2_1_74_1","volume-title":"Retrieved","author":"QEMU.","year":"2016","unstructured":"QEMU. 2016 . QEMU: Open source processor emulator . Retrieved August 23, 2018 from http:\/\/wiki.qemu.org\/Main_Page. QEMU. 2016. QEMU: Open source processor emulator. Retrieved August 23, 2018 from http:\/\/wiki.qemu.org\/Main_Page."},{"key":"e_1_2_1_75_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing digital side-channels through obfuscated execution . In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915) . USENIX Association, Berkeley, CA, 431--446. http:\/\/dl.acm.org\/citation.cfm?id&equals;2831143.2831171 Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing digital side-channels through obfuscated execution. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). USENIX Association, Berkeley, CA, 431--446. http:\/\/dl.acm.org\/citation.cfm?id&equals;2831143.2831171"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten Van Dijk , and Srinivas Devadas . 2015 . Constants count: Practical improvements to oblivious RAM . In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915) . USENIX Association, Berkeley, CA, 415--430. Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, and Srinivas Devadas. 2015. Constants count: Practical improvements to oblivious RAM. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). USENIX Association, Berkeley, CA, 415--430."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the 19th USENIX Security Symposium (USENIX Security\u201910)","author":"Sehr David","year":"2010","unstructured":"David Sehr , Robert Muth , Cliff Biffle , Victor Khimenko , Egor Pasko , Karl Schimpf , Bennet Yee , and Brad Chen . 2010 . Adapting software fault isolation to contemporary CPU architectures . In Proceedings of the 19th USENIX Security Symposium (USENIX Security\u201910) . USENIX Association, Berkeley, CA, 1--1. David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting software fault isolation to contemporary CPU architectures. In Proceedings of the 19th USENIX Security Symposium (USENIX Security\u201910). USENIX Association, Berkeley, CA, 1--1."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685060"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens . 2016 . Ariadne: A minimal approach to state continuity . In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916) . USENIX Association, Berkeley, CA, 875--892. Raoul Strackx and Frank Piessens. 2016. Ariadne: A minimal approach to state continuity. In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916). USENIX Association, Berkeley, CA, 875--892."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669174"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E. Porter , and Mona Vij . 2017 . Graphene-SGX: A practical library OS for unmodified applications on SGX . In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917) . USENIX Association, Berkeley, CA, 645--658. Chia-Che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A practical library OS for unmodified applications on SGX. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917). USENIX Association, Berkeley, CA, 645--658."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2304439"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741966"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_2_1_92_1","volume-title":"Retrieved","author":"Ylonen Tatu","year":"2008","unstructured":"Tatu Ylonen and Chris Lonvick . 2008 . RFC 5246: The Transport Layer Security (TLS) Protocol: Version 1.2 . Retrieved August 23, 2018 from https:\/\/tools.ietf.org\/html\/rfc5246. Tatu Ylonen and Chris Lonvick. 2008. RFC 5246: The Transport Layer Security (TLS) Protocol: Version 1.2. Retrieved August 23, 2018 from https:\/\/tools.ietf.org\/html\/rfc5246."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387610"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046772"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254078"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3231594","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3231594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:03Z","timestamp":1750212423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231594"}},"subtitle":["A Distributed Sandbox for Untrusted Computation on Secret Data"],"short-title":[],"issued":{"date-parts":[[2017,11,30]]},"references-count":98,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11,30]]}},"alternative-id":["10.1145\/3231594"],"URL":"https:\/\/doi.org\/10.1145\/3231594","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,30]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}