{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:05:23Z","timestamp":1761663923205,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T00:00:00Z","timestamp":1561161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Center for Future Architectures Research (CFAR)"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1703931 1527301 1149773"],"award-info":[{"award-number":["1703931 1527301 1149773"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,22]]},"DOI":"10.1145\/3307650.3322265","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"372-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["InvisiPage"],"prefix":"10.1145","author":[{"given":"Shaizeen","family":"Aga","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor"}]},{"given":"Satish","family":"Narayanasamy","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor"}]}],"member":"320","published-online":{"date-parts":[[2019,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Ensembl genome browser. \"http:\/\/www.ensembl.org\/index.html\". (2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Intel\u00c2\u0151 Core\u00e2\u010e\u01072 Quad Processor Q6600. \"https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/products\/29765\/intel-core-2-quad-processor-q6600-8m-cache-2-40-ghz-1066-mhz-fsb.html\". (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. MIT-Adobe fivek dataset. \"http:\/\/groups.csail.mit.edu\/graphics\/fivek_dataset\/\". (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Redis. \"http:\/\/redis.io\/\". (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. Redis Labs. Memtier Benchmark. \"https:\/\/github.com\/RedisLabs\/memtierbenchmark\". (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080232"},{"key":"e_1_3_2_1_7_1","volume-title":"OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '13)","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon P Johnson, and Vincent R Scarlata. 2013. Innovative technology for cpu based attestation and sealing. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '13)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026930"},{"key":"e_1_3_2_1_10_1","volume-title":"The Netflix Prize. In KDD Cup and Workshop at ACM SIGKDD, 2007","author":"Bennett J","year":"2007","unstructured":"J Bennett and S Lanning. 2007. The Netflix Prize. In KDD Cup and Workshop at ACM SIGKDD, 2007. (2007)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806596"},{"volume-title":"High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on.","author":"Champagne D.","key":"e_1_3_2_1_12_1","unstructured":"D. Champagne and R. B. Lee. 2010. Scalable architectural support for trusted software. In High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_15_1","unstructured":"Intel corp. 2015. Improving Real-Time Performance by Utilizing Cache Allocation Technology. Intel White paper. (2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241161"},{"key":"e_1_3_2_1_17_1","unstructured":"T Davis. 2017. The University of Florida Sparse Matrix Collection. \"http:\/\/www.cise.ufl.edu\/research\/sparse\/matrices\". (2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277311"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"D. Evtyushkin J. Elwell M. Ozsoy D. Ponomarev N. A. Ghazaleh and R. Riley. 2018. Flexible Hardware-Managed Isolated Execution: Architecture Software Support and Applications. IEEE Transactions on Dependable and Secure Computing (2018).","DOI":"10.1109\/TDSC.2016.2596287"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2006.61"},{"key":"e_1_3_2_1_23_1","volume-title":"Introduction to differential power analysis. Journal of Cryptographic Engineering","author":"Kocher Paul","year":"2011","unstructured":"Paul Kocher, Joshua Jaffe, Benjamin Jun, and Pankaj Rohatgi. 2011. Introduction to differential power analysis. Journal of Cryptographic Engineering (2011), 5--27."},{"key":"e_1_3_2_1_24_1","volume-title":"PRIMEX: rapid identification of oligonucleotide matches in whole genomes. Bioinformatics","author":"Lexa Matej","year":"2003","unstructured":"Matej Lexa and Giorgio Valle. 2003. PRIMEX: rapid identification of oligonucleotide matches in whole genomes. Bioinformatics (2003)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_1_29_1","volume-title":"Side Channel Cryptanalysis. In Workshop on the Security of Communications on the Internet (SECI).","author":"Quisquater Jean-Jacques","year":"2002","unstructured":"Jean-Jacques Quisquater and David Samyde. 2002. Side Channel Cryptanalysis. In Workshop on the Security of Communications on the Internet (SECI)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485971"},{"volume-title":"Introduction to Recommender Systems Handbook","author":"Ricci Francesco","key":"e_1_3_2_1_31_1","unstructured":"Francesco Ricci, Lior Rokach, and Bracha Shapira. 2011. Introduction to Recommender Systems Handbook. Springer US."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Y. Sa. 2015. Medical Image Registration Algorithm Based on Compressive Sensing and Scale-Invariant Feature Transform. In 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA).","DOI":"10.1109\/ICICTA.2015.140"},{"volume-title":"2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).","author":"Salahat E.","key":"e_1_3_2_1_33_1","unstructured":"E. Salahat, H. Saleh, A. S. Sluzek, B. Mohammad, M. Al-Qutayri, and M. Ismail. {n. d.}. Novel MSER-guided street extraction from satellite images. In 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)."},{"volume-title":"2014 11th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).","author":"Salazar-Licea L. A.","key":"e_1_3_2_1_34_1","unstructured":"L. A. Salazar-Licea, C. Mendoza, M. A. Aceves, J. C. Pedraza, and A. Pastrana-Palma. 2014. Automatic segmentation of mammograms using a Scale-Invariant Feature Transform and K-means clustering algorithm. In 2014 11th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830795"},{"key":"e_1_3_2_1_36_1","volume-title":"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Shih Ming-Wei","year":"2017","unstructured":"Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26-March 1, 2017."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809983"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306794"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080208"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671271"},{"volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)","author":"Zhang Danfeng","key":"e_1_3_2_1_48_1","unstructured":"Danfeng Zhang, Aslan Askarov, and Andrew C.Myers. 2011. Predictive Mitigation of Timing Channels in Interactive Systems. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","unstructured":"Haijiang Zhu Junhui Sheng Fan Zhang Jinglin Zhou and Jing Wang. 2016. Improved Maximally Stable Extremal Regions Based Method for the Segmentation of Ultrasonic Liver Images. Multimedia Tools Appl. (2016). 10.1007\/s11042-015-2822-z","DOI":"10.1007\/s11042-015-2822-z"}],"event":{"name":"ISCA '19: The 46th Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\DATC IEEE Computer Society"],"location":"Phoenix Arizona","acronym":"ISCA '19"},"container-title":["Proceedings of the 46th International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322265","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307650.3322265","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307650.3322265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:06Z","timestamp":1750204446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322265"}},"subtitle":["oblivious demand paging for secure enclaves"],"short-title":[],"issued":{"date-parts":[[2019,6,22]]},"references-count":48,"alternative-id":["10.1145\/3307650.3322265","10.1145\/3307650"],"URL":"https:\/\/doi.org\/10.1145\/3307650.3322265","relation":{},"subject":[],"published":{"date-parts":[[2019,6,22]]},"assertion":[{"value":"2019-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}