{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:11Z","timestamp":1773512591336,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1718084"],"award-info":[{"award-number":["1718084"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1750809"],"award-info":[{"award-number":["1750809"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354220","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2317-2331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["OPERA"],"prefix":"10.1145","author":[{"given":"Guoxing","family":"Chen","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Ten-Hwang","family":"Lai","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CoRR","author":"Alder Fritz","year":"2018"},{"key":"e_1_3_2_2_2_1","unstructured":"Alicloud. 2018. ECS Bare Metal Instance. https:\/\/www.alibabacloud.com\/product\/ebm.  Alicloud. 2018. ECS Bare Metal Instance. https:\/\/www.alibabacloud.com\/product\/ebm."},{"key":"e_1_3_2_2_3_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM.","author":"Anati Ittai","year":"2013"},{"key":"e_1_3_2_2_4_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation. USENIX Association.","author":"Arnautov Sergei","year":"2016"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society","author":"Backes Michael"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_2_7_1","volume-title":"2017 IEEE Symposium on Security and Privacy (SP) .","author":"Bhargavan K."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_2_10_1","volume-title":"IEEE Second International Conference on Social Computing. 768--775","author":"Brickell E."},{"key":"e_1_3_2_2_11_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia","year":"2017"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 2019 IEEE European Symposium on Security and Privacy .","author":"Chen Guoxing"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 22nd Annual Symposium on Foundations of Computer Science (SFCS '81)","author":"Dolev D."},{"key":"e_1_3_2_2_15_1","unstructured":"Fortanix. 2018. Runtime Encryption with Intel SGX. https:\/\/fortanix.com\/.  Fortanix. 2018. Runtime Encryption with Intel SGX. https:\/\/fortanix.com\/."},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the Conference on Design, Automation & Test in Europe (DATE '14)","author":"Francillon Aur\u00e9lien","year":"2014"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_2_18_1","volume-title":"Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Hunt Tyler","year":"2016"},{"key":"e_1_3_2_2_19_1","unstructured":"Intel. 2017. Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes:1 2A 2B 2C 3A 3B 3C and 3D. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1--2abcd-3abcd.pdf .  Intel. 2017. Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes:1 2A 2B 2C 3A 3B 3C and 3D. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1--2abcd-3abcd.pdf ."},{"key":"e_1_3_2_2_20_1","unstructured":"Intel. 2018. Intel Software Guard Extensions (Intel SGX) Services. https:\/\/api.portal.trustedservices.intel.com\/.  Intel. 2018. Intel Software Guard Extensions (Intel SGX) Services. https:\/\/api.portal.trustedservices.intel.com\/."},{"key":"e_1_3_2_2_23_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. White paper. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf.  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. White paper. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf."},{"key":"e_1_3_2_2_24_1","volume-title":"Integrating Remote Attestation with Transport Layer Security. CoRR","author":"Knauth Thomas","year":"2018"},{"key":"e_1_3_2_2_25_1","volume-title":"Companion Proceedings of the The Web Conference 2018 (WWW '18). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland.","author":"Kurnikov Arseny"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_2_27_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Matetic Sinisa","year":"2017"},{"key":"e_1_3_2_2_28_1","volume-title":"Innovative Instructions and Software Model for Isolated Execution. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM.","author":"McKeen Frank","year":"2013"},{"key":"e_1_3_2_2_29_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium. USENIX Association.","author":"Ohrimenko Olga","year":"2016"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_2_31_1","unstructured":"Mark Russinovich. 2017. Introducing Azure confidential computing. https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/.  Mark Russinovich. 2017. Introducing Azure confidential computing. https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/."},{"key":"e_1_3_2_2_32_1","unstructured":"Vinnie Scarlata Simon Johnson James Beaney and Piotr Zmijewski. 2018. Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives. (2018). https:\/\/software.intel.com\/sites\/default\/files\/managed\/f1\/b8\/intel-sgx-support-for-third-party-attestation.pdf  Vinnie Scarlata Simon Johnson James Beaney and Piotr Zmijewski. 2018. Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives. (2018). https:\/\/software.intel.com\/sites\/default\/files\/managed\/f1\/b8\/intel-sgx-support-for-third-party-attestation.pdf"},{"key":"e_1_3_2_2_33_1","volume-title":"36th IEEE Symposium on Security and Privacy .","author":"Schuster F."},{"key":"e_1_3_2_2_34_1","volume-title":"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In The Network and Distributed System Security Symposium .","author":"Seo Jaebaek","year":"2017"},{"key":"e_1_3_2_2_35_1","volume-title":"Panoply: Low-TCB Linux Applications With SGX Enclaves. In The Network and Distributed System Security Symposium .","author":"Shinde Shweta","year":"2017"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00021"},{"key":"e_1_3_2_2_38_1","volume-title":"25th USENIX Security Symposium. USENIX Association.","author":"Strackx Raoul","year":"2016"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","volume-title":"The Circle Game: Scalable Private Membership Test Using Trusted Hardware. In ACM on Asia Conference on Computer and Communications Security. ACM.","author":"Tamrakar Sandeep","DOI":"10.1145\/3052973.3053006"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"},{"key":"e_1_3_2_2_42_1","volume-title":"22nd Asia and South Pacific Design Automation Conference .","author":"Tychalas D."},{"key":"e_1_3_2_2_43_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018"},{"key":"e_1_3_2_2_44_1","volume-title":"RIDL: Rogue In-flight Data Load. In 40th IEEE Symposium on Security and Privacy .","author":"van Schaik Stephan","year":"2019"},{"key":"e_1_3_2_2_45_1","volume-title":"USENIX Security Symposium .","author":"Varadarajan Venkatanathan","year":"2015"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029822"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_2_48_1","volume-title":"REM: Resource-Efficient Mining for Blockchains. In 26th USENIX Security Symposium. USENIX Association.","author":"Zhang Fan","year":"2017"},{"key":"e_1_3_2_2_49_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association.","author":"Zheng Wenting","year":"2017"},{"key":"e_1_3_2_2_50_1","volume-title":"Enigma: Decentralized Computation Platform with Guaranteed Privacy. CoRR","author":"Zyskind Guy","year":"2015"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354220","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354220","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354220"}},"subtitle":["Open Remote Attestation for Intel's Secure Enclaves"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":47,"alternative-id":["10.1145\/3319535.3354220","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354220","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}