{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:30Z","timestamp":1750221210830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1145\/3232565.3232575","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T13:18:10Z","timestamp":1531747090000},"page":"43-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Preserving Privacy at IXPs"],"prefix":"10.1145","author":[{"given":"Xiaohe","family":"Hu","sequence":"first","affiliation":[{"name":"Tsinghua"}]},{"given":"Arpit","family":"Gupta","sequence":"additional","affiliation":[{"name":"Princeton"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Princeton"}]},{"given":"Aurojit","family":"Panda","sequence":"additional","affiliation":[{"name":"NYU\/Nefeli"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley\/ICSI"}]}],"member":"320","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amsterdam Internet Exchange (AMS-IX). https:\/\/ams-ix.net.  Amsterdam Internet Exchange (AMS-IX). https:\/\/ams-ix.net."},{"key":"e_1_3_2_1_2_1","unstructured":"Amsterdam Internet Exchange: Members. https:\/\/ams-ix.net\/connected_parties retrieved 04\/20\/2018.  Amsterdam Internet Exchange: Members. https:\/\/ams-ix.net\/connected_parties retrieved 04\/20\/2018."},{"key":"e_1_3_2_1_3_1","volume-title":"OSDI","author":"Arnautov S.","year":"2016","unstructured":"S. Arnautov , B. Trach , F. Gregor , T. Knauth , A. Martin , C. Priebe , J. Lind , D. Muthukumaran , D. O'Keeffe , M. Stillwell , D. Goltzsche , D. M. Eyers , R. Kapitza , P. R. Pietzuch , and C. Fetzer . SCONE: Secure Linux Containers with Intel SGX . In OSDI , 2016 . S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin, C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe, M. Stillwell, D. Goltzsche, D. M. Eyers, R. Kapitza, P. R. Pietzuch, and C. Fetzer. SCONE: Secure Linux Containers with Intel SGX. In OSDI, 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9214-4"},{"key":"e_1_3_2_1_5_1","volume-title":"OSDI","author":"Baumann A.","year":"2014","unstructured":"A. Baumann , M. Peinado , and G. C. Hunt . Shielding Applications from an Untrusted Cloud with Haven . In OSDI , 2014 . A. Baumann, M. Peinado, and G. C. Hunt. Shielding Applications from an Untrusted Cloud with Haven. In OSDI, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_7_1","unstructured":"The BIRD Internet Routing Daemon. http:\/\/bird.network.cz.  The BIRD Internet Routing Daemon. http:\/\/bird.network.cz."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143362"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987309"},{"key":"e_1_3_2_1_11_1","volume-title":"IACR Cryptology ePrint Archive","author":"Choi S. G.","year":"2011","unstructured":"S. G. Choi , K.-W. Hwang , J. Katz , T. Malkin , and D. Rubenstein . Secure multiparty computation of boolean circuits with applications to privacy in on-line marketplaces . In IACR Cryptology ePrint Archive , 2011 . S. G. Choi, K.-W. Hwang, J. Katz, T. Malkin, and D. Rubenstein. Secure multiparty computation of boolean circuits with applications to privacy in on-line marketplaces. In IACR Cryptology ePrint Archive, 2011."},{"key":"e_1_3_2_1_12_1","unstructured":"ExaBGP overview. https:\/\/github.com\/Exa-Networks\/exabgp\/wiki.  ExaBGP overview. https:\/\/github.com\/Exa-Networks\/exabgp\/wiki."},{"key":"e_1_3_2_1_13_1","volume-title":"Secure multiparty computation","author":"Goldreich O.","year":"1998","unstructured":"O. Goldreich , B. Chor , S. Goldwasser , and L. A. Levin . Secure multiparty computation . 1998 . O. Goldreich, B. Chor, S. Goldwasser, and L. A. Levin. Secure multiparty computation. 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_15_1","volume-title":"NSDI","author":"Gupta A.","year":"2016","unstructured":"A. Gupta , R. MacDavid , R. Birkner , M. Canini , N. Feamster , J. Rexford , and L. Vanbever . An Industrial-Scale Software Defined Internet Exchange Point . In NSDI , 2016 . A. Gupta, R. MacDavid, R. Birkner, M. Canini, N. Feamster, J. Rexford, and L. Vanbever. An Industrial-Scale Software Defined Internet Exchange Point. In NSDI, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626300"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390238"},{"key":"e_1_3_2_1_18_1","unstructured":"IX.br. http:\/\/ix.br.  IX.br. http:\/\/ix.br."},{"key":"e_1_3_2_1_19_1","unstructured":"IX.br Members. http:\/\/ix.br\/particip\/sp retrieved 04\/20\/2018.  IX.br Members. http:\/\/ix.br\/particip\/sp retrieved 04\/20\/2018."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834100"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_22_1","unstructured":"Meltdown and Spectre. https:\/\/meltdownattack.com.  Meltdown and Spectre. https:\/\/meltdownattack.com."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663757"},{"key":"e_1_3_2_1_24_1","unstructured":"RIS Raw Data. https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris\/ris-raw-data.  RIS Raw Data. https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris\/ris-raw-data."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"e_1_3_2_1_26_1","unstructured":"Intel(R) Software Guard Extensions for Linux* OS. https:\/\/github.com\/01org\/linux-sgx.  Intel(R) Software Guard Extensions for Linux* OS. https:\/\/github.com\/01org\/linux-sgx."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354576"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium","author":"Tang A.","year":"2017","unstructured":"A. Tang , S. Sethumadhavan , and S. J. Stolfo . Clkscrew: Exposing the perils of security-oblivious energy management . In USENIX Security Symposium , 2017 . A. Tang, S. Sethumadhavan, and S. J. Stolfo. Clkscrew: Exposing the perils of security-oblivious energy management. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_29_1","unstructured":"GlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide. https:\/\/www.globalplatform.org\/mediaguidetee.asp.  GlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide. https:\/\/www.globalplatform.org\/mediaguidetee.asp."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"}],"event":{"name":"APNet '18: 2nd Asia-Pacific Workshop on Networking","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","Tsinghua University TsingHua University Philips Research"],"location":"Beijing China","acronym":"APNet '18"},"container-title":["Proceedings of the 2nd Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3232565.3232575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3232565.3232575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:42Z","timestamp":1750210782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3232565.3232575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":33,"alternative-id":["10.1145\/3232565.3232575","10.1145\/3232565"],"URL":"https:\/\/doi.org\/10.1145\/3232565.3232575","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]},"assertion":[{"value":"2018-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}