{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T11:14:13Z","timestamp":1753182853824,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T00:00:00Z","timestamp":1543190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,26]]},"DOI":"10.1145\/3274808.3274823","type":"proceedings-article","created":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T18:41:21Z","timestamp":1550083281000},"page":"187-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["EActors"],"prefix":"10.1145","author":[{"given":"Vasily A.","family":"Sartakov","sequence":"first","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Stefan","family":"Brenner","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Sonia","family":"Ben Mokhtar","sequence":"additional","affiliation":[{"name":"INSA Lyon"}]},{"given":"Sara","family":"Bouchenak","sequence":"additional","affiliation":[{"name":"INSA Lyon"}]},{"given":"Ga\u00ebl","family":"Thomas","sequence":"additional","affiliation":[{"name":"Telecom SudParis"}]},{"given":"R\u00fcdiger","family":"Kapitza","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]}],"member":"320","published-online":{"date-parts":[[2018,11,26]]},"reference":[{"volume-title":"6th Gen Intel Core X-Series Processor Family Datasheet","key":"e_1_3_2_2_1_1","unstructured":"2017. 6th Gen Intel Core X-Series Processor Family Datasheet , Vol. 1 . 2017. 6th Gen Intel Core X-Series Processor Family Datasheet, Vol. 1."},{"key":"e_1_3_2_2_2_1","unstructured":"2017. Signal taps up Intel's SGX to (hopefully) stop contacts falling into hackers cops' hands. https:\/\/www.theregister.co.uk\/2017\/09\/27\/signal_turns_to_intels_sgx_to_lock_down_contacts_from_spying_eyes\/  2017. Signal taps up Intel's SGX to (hopefully) stop contacts falling into hackers cops' hands. https:\/\/www.theregister.co.uk\/2017\/09\/27\/signal_turns_to_intels_sgx_to_lock_down_contacts_from_spying_eyes\/"},{"key":"e_1_3_2_2_3_1","unstructured":"2018. \"libstrophe - An XMPP library for C\". http:\/\/strophe.im\/libstrophe\/  2018. \"libstrophe - An XMPP library for C\". http:\/\/strophe.im\/libstrophe\/"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/646727.703340"},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. INAP","volume":"96","author":"Armstrong Joe","year":"1996","unstructured":"Joe Armstrong . 1996 . Erlang -- a Survey of the Language and its Industrial Applications . In Proc. INAP , Vol. 96 . Joe Armstrong. 1996. Erlang -- a Survey of the Language and its Industrial Applications. In Proc. INAP, Vol. 96."},{"key":"e_1_3_2_2_6_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andr\u00e9 Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Daniel O'Keeffe , Mark L Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andr\u00e9 Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Daniel O'Keeffe, Mark L Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59665-5_13"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"e_1_3_2_2_12_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In 26th USENIX Security Symposium (USENIX Security 17) . Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2687357.2687363"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541329.2541336"},{"key":"e_1_3_2_2_15_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia","year":"2017","unstructured":"Chia che Tsai , Donald E. Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . 645--658. Chia che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 645--658."},{"key":"e_1_3_2_2_16_1","volume-title":"International Conference on Distributed Computing Systems (ICDCS'13)","author":"Chondros Nikos","year":"2013","unstructured":"Nikos Chondros , Bingsheng Zhang , Thomas Zacharias , Panos Diamantopoulos , Stathis Maneas , Christos Patsonakis , Alex Delis , Aggelos Kiayias , and Mema Roussopoulos . 2013 . A distributed, end-to-end verifiable, internet voting system . In International Conference on Distributed Computing Systems (ICDCS'13) . Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, and Mema Roussopoulos. 2013. A distributed, end-to-end verifiable, internet voting system. In International Conference on Distributed Computing Systems (ICDCS'13)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"volume-title":"A fully homomorphic encryption scheme","author":"Gentry Craig","key":"e_1_3_2_2_20_1","unstructured":"Craig Gentry . 2009. A fully homomorphic encryption scheme . Stanford University . Craig Gentry. 2009. A fully homomorphic encryption scheme. Stanford University."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.22"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. 14--14","author":"Guha Saikat","year":"2012","unstructured":"Saikat Guha , Mudit Jain , and Venkata N Padmanabhan . 2012 . Koi: A location-privacy platform for smartphone apps . In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. 14--14 . Saikat Guha, Mudit Jain, and Venkata N Padmanabhan. 2012. Koi: A location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. 14--14."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.019"},{"volume-title":"Classic operating systems","author":"Hansen Per Brinch","key":"e_1_3_2_2_24_1","unstructured":"Per Brinch Hansen . 2001. The evolution of operating systems . In Classic operating systems . Springer , 1--34. Per Brinch Hansen. 2001. The evolution of operating systems. In Classic operating systems. Springer, 1--34."},{"key":"e_1_3_2_2_25_1","volume-title":"Lateral Thinking for Trustworthy Apps. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 1890--1899","author":"H\u00e4rtig Hermann","year":"2017","unstructured":"Hermann H\u00e4rtig , Michael Roitzsch , Carsten Weinhold , and Adam Lackorzyn-ski. 2017 . Lateral Thinking for Trustworthy Apps. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 1890--1899 . Hermann H\u00e4rtig, Michael Roitzsch, Carsten Weinhold, and Adam Lackorzyn-ski. 2017. Lateral Thinking for Trustworthy Apps. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 1890--1899."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093742.3093927"},{"key":"e_1_3_2_2_27_1","unstructured":"Intel. 2017. Intel\u00ae Software Guard Extensions SDK for Linux* OS Revision 2.0. https:\/\/01.org\/intel-software-guard-extensions\/documentation\/intel-sgx-sdk-developer-reference.  Intel. 2017. Intel\u00ae Software Guard Extensions SDK for Linux* OS Revision 2.0. https:\/\/01.org\/intel-software-guard-extensions\/documentation\/intel-sgx-sdk-developer-reference."},{"key":"e_1_3_2_2_28_1","unstructured":"Intel. 2018. Intel\u00ae Software Guard Extensions SDK for Linux* OS Revision 2.2. https:\/\/download.01.org\/intel-sgx\/linux-2.2\/docs\/Intel_SGX_Developer_Reference_Linux_2.2_Open_Source.pdf.  Intel. 2018. Intel\u00ae Software Guard Extensions SDK for Linux* OS Revision 2.2. https:\/\/download.01.org\/intel-sgx\/linux-2.2\/docs\/Intel_SGX_Developer_Reference_Linux_2.2_Open_Source.pdf."},{"key":"e_1_3_2_2_29_1","volume-title":"Kafura and Keung H Lee","author":"Dennis","year":"1989","unstructured":"Dennis G. Kafura and Keung H Lee . 1989 . ACT++: Building a Concurrent C++ with Actors. Technical Report. Blacksburg, VA, USA. Dennis G. Kafura and Keung H Lee. 1989. ACT++: Building a Concurrent C++ with Actors. Technical Report. Blacksburg, VA, USA."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/167962.165874"},{"key":"e_1_3_2_2_31_1","unstructured":"Jaehyuk Lee Jinsoo Jang Yeongjin Jang Nohyun Kwak Yeseul Choi Changho Choi Taesoo Kim Marcus Peinado and Brent Byunghoon Kang. 2017. Hacking in darkness: Return-oriented programming against secure enclaves. In USENIX Security. 523--539.   Jaehyuk Lee Jinsoo Jang Yeongjin Jang Nohyun Kwak Yeseul Choi Changho Choi Taesoo Kim Marcus Peinado and Brent Byunghoon Kang. 2017. Hacking in darkness: Return-oriented programming against secure enclaves. In USENIX Security. 523--539."},{"key":"e_1_3_2_2_32_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17) . 557--574. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17). 557--574."},{"key":"e_1_3_2_2_33_1","volume-title":"Glamdring: Automatic Application Partitioning for Intel SGX. In USENIX Annual Technical Conference (USENIX ATC 17)","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind , Christian Priebe , Divya Muthukumaran , Dan O'Keeffe , Pierre-Louis Aublin , Florian Kelbert , Tobias Reiher , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , Christof Fetzer , and Peter Pietzuch . 2017 . Glamdring: Automatic Application Partitioning for Intel SGX. In USENIX Annual Technical Conference (USENIX ATC 17) . 285--298. Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Christof Fetzer, and Peter Pietzuch. 2017. Glamdring: Automatic Application Partitioning for Intel SGX. In USENIX Annual Technical Conference (USENIX ATC 17). 285--298."},{"key":"e_1_3_2_2_34_1","volume-title":"Secure Multiparty Computation for Privacy-Preserving Data Mining. IACR Cryptology ePrint Archive","author":"Lindell Yehuda","year":"2008","unstructured":"Yehuda Lindell and Benny Pinkas . 2008. Secure Multiparty Computation for Privacy-Preserving Data Mining. IACR Cryptology ePrint Archive ( 2008 ), 197. Yehuda Lindell and Benny Pinkas. 2008. Secure Multiparty Computation for Privacy-Preserving Data Mining. IACR Cryptology ePrint Archive (2008), 197."},{"key":"e_1_3_2_2_35_1","volume-title":"Along Came Linus, and Before We Begin.","author":"Love Robert","year":"2005","unstructured":"Robert Love , So Here We Are , Along Came Linus, and Before We Begin. 2005 . Linux kernel development second edition. Novell Press . Robert Love, So Here We Are, Along Came Linus, and Before We Begin. 2005. Linux kernel development second edition. Novell Press."},{"volume-title":"ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Matetic Sinisa","key":"e_1_3_2_2_36_1","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . {n. d.}. ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security 17) . 1289--1306. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. {n. d.}. ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security 17). 1289--1306."},{"key":"e_1_3_2_2_37_1","volume-title":"Innovative instructions and software model for isolated execution. HASP@ ISCA 10","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R Savagaonkar . 2013. Innovative instructions and software model for isolated execution. HASP@ ISCA 10 ( 2013 ). Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. HASP@ ISCA 10 (2013)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135987"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.421"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988346"},{"volume-title":"Proceedings of the 34th annual ACM\/IEEE international symposium on Microarchitecture. 294--305","author":"Ravi","key":"e_1_3_2_2_42_1","unstructured":"Ravi Raj war and James R Goodman. 2001. Speculative lock elision: Enabling highly concurrent multithreaded execution . In Proceedings of the 34th annual ACM\/IEEE international symposium on Microarchitecture. 294--305 . Ravi Raj war and James R Goodman. 2001. Speculative lock elision: Enabling highly concurrent multithreaded execution. In Proceedings of the 34th annual ACM\/IEEE international symposium on Microarchitecture. 294--305."},{"volume-title":"Linux device drivers. \"O'Reilly Media","author":"Rubini Alessandro","key":"e_1_3_2_2_43_1","unstructured":"Alessandro Rubini and Jonathan Corbet . 2001. Linux device drivers. \"O'Reilly Media , Inc .\". Alessandro Rubini and Jonathan Corbet. 2001. Linux device drivers. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Peter Saint-Andre. 2011. Extensible messaging and presence protocol (XMPP): Core. https:\/\/xmpp.org\/rfcs\/rfc6120.html  Peter Saint-Andre. 2011. Extensible messaging and presence protocol (XMPP): Core. https:\/\/xmpp.org\/rfcs\/rfc6120.html","DOI":"10.17487\/rfc6120"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00024"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_6"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080208"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/355616.364017"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"Middleware '18: 19th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"],"location":"Rennes France","acronym":"Middleware '18"},"container-title":["Proceedings of the 19th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274808.3274823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274808.3274823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:03Z","timestamp":1750207443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274808.3274823"}},"subtitle":["Fast and flexible trusted computing using SGX"],"short-title":[],"issued":{"date-parts":[[2018,11,26]]},"references-count":53,"alternative-id":["10.1145\/3274808.3274823","10.1145\/3274808"],"URL":"https:\/\/doi.org\/10.1145\/3274808.3274823","relation":{},"subject":[],"published":{"date-parts":[[2018,11,26]]},"assertion":[{"value":"2018-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}