{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:23Z","timestamp":1773840203650,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Samsung Semiconductor"},{"name":"National Research Foundation of Korea (NRF)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384717","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"799-812","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX"],"prefix":"10.1145","author":[{"given":"Jinwoo","family":"Ahn","sequence":"first","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Junghee","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, South Korea"}]},{"given":"Yungwoo","family":"Ko","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Donghyun","family":"Min","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Jiyun","family":"Park","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Sungyong","family":"Park","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Youngjae","family":"Kim","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2017. Petya\/NotPetya Ransomware Analysis. https:\/\/idafchev.github.io\/writeup\/2017\/07\/21\/petya_ransomware_analysis.html.  2017. Petya\/NotPetya Ransomware Analysis. https:\/\/idafchev.github.io\/writeup\/2017\/07\/21\/petya_ransomware_analysis.html."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS).","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad , Kyungtae Kim , Muhammad Ihsanulhaq Sarfaraz , and Byoungyoung Lee . 2018 . Obliviate: A data oblivious file system for intel SGX . In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS). Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. Obliviate: A data oblivious file system for intel SGX. In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST).","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu , J\u00f6rg Thalheim , Pramod Bhatotia , Christof Fetzer , Michio Honda , and Kapil Vaswani . 2019 . SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution . In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST). Maurice Bailleu, J\u00f6rg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_3_2_2_4_1","unstructured":"Osborne Charlie. 2018. Shamoon data-wiping malware believed to be the work of Iranian hackers. https:\/\/www.zdnet.com\/article\/shamoons-data-wiping-malware-believed-to-be-the-work-of-iranian-hackers\/.  Osborne Charlie. 2018. Shamoon data-wiping malware believed to be the work of Iranian hackers. https:\/\/www.zdnet.com\/article\/shamoons-data-wiping-malware-believed-to-be-the-work-of-iranian-hackers\/."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154601.3154611"},{"key":"e_1_3_2_2_6_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive , Vol. 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive, Vol. 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_7_1","volume-title":"Meeting the Threat of Ransomware. https:\/\/www.healthdatamanagement.com\/author\/joseph-goedert.","author":"Goedert Joseph","year":"2016","unstructured":"Joseph Goedert . 2016 . Meeting the Threat of Ransomware. https:\/\/www.healthdatamanagement.com\/author\/joseph-goedert. Joseph Goedert. 2016. Meeting the Threat of Ransomware. https:\/\/www.healthdatamanagement.com\/author\/joseph-goedert."},{"key":"e_1_3_2_2_8_1","unstructured":"Dan Goodin. 2017. A New Ransomware Outbreak Similar to WCry is Shutting Down Computers Worldwide. https:\/\/arstechnica.com\/security\/2017\/06\/a-new-ransomware-outbreak-similar-to-wcry-is-shutting-down-computers-worldwide\/.  Dan Goodin. 2017. A New Ransomware Outbreak Similar to WCry is Shutting Down Computers Worldwide. https:\/\/arstechnica.com\/security\/2017\/06\/a-new-ransomware-outbreak-similar-to-wcry-is-shutting-down-computers-worldwide\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Intel. [n.d.] a. Intel Protected File System Library. https:\/\/software.intel.com\/sites\/default\/files\/managed\/76\/8f\/OverviewOfIntelProtectedFileSystemLibrary.pdf.  Intel. [n.d.] a. Intel Protected File System Library. https:\/\/software.intel.com\/sites\/default\/files\/managed\/76\/8f\/OverviewOfIntelProtectedFileSystemLibrary.pdf."},{"key":"e_1_3_2_2_10_1","unstructured":"Intel. [n.d.] b. Intel Software Guard Extensions Developer Guide. https:\/\/download.01.org\/intel-sgx\/linux-1.7\/docs\/Intel_SGX_Developer_Guide.pdf.  Intel. [n.d.] b. Intel Software Guard Extensions Developer Guide. https:\/\/download.01.org\/intel-sgx\/linux-1.7\/docs\/Intel_SGX_Developer_Guide.pdf."},{"key":"e_1_3_2_2_11_1","unstructured":"Intel. [n.d.] c. Introduction to Intel SGX Sealing. https:\/\/software.intel.com\/en-us\/blogs\/2016\/05\/04\/introduction-to-intel-sgx-sealing.  Intel. [n.d.] c. Introduction to Intel SGX Sealing. https:\/\/software.intel.com\/en-us\/blogs\/2016\/05\/04\/introduction-to-intel-sgx-sealing."},{"key":"e_1_3_2_2_12_1","unstructured":"Intel. [n.d.] d. Local (Intra-Platform) Attestation. https:\/\/software.intel.com\/en-us\/node\/702983.  Intel. [n.d.] d. Local (Intra-Platform) Attestation. https:\/\/software.intel.com\/en-us\/node\/702983."},{"key":"e_1_3_2_2_13_1","unstructured":"Jonathan S. (Intel). 2016. Introduction to the Storage Performance Development Kit (SPDK). https:\/\/software.intel.com\/en-us\/articles\/introduction-to-the-storage-performance-development-kit-spdk.  Jonathan S. (Intel). 2016. Introduction to the Storage Performance Development Kit (SPDK). https:\/\/software.intel.com\/en-us\/articles\/introduction-to-the-storage-performance-development-kit-spdk."},{"key":"e_1_3_2_2_14_1","unstructured":"Devika Jain. 2017. Shamoon 2: Back On the Prowl. https:\/\/nsfocusglobal.com\/shamoon-2-back-on-the-prowl\/.  Devika Jain. 2017. Shamoon 2: Back On the Prowl. https:\/\/nsfocusglobal.com\/shamoon-2-back-on-the-prowl\/."},{"key":"e_1_3_2_2_15_1","volume-title":"Roundtable: Ransomware., 25--32 pages. Health Data Management.","author":"Kass Elliot","year":"2016","unstructured":"Elliot Kass . 2016 . Roundtable: Ransomware., 25--32 pages. Health Data Management. Elliot Kass. 2016. Roundtable: Ransomware., 25--32 pages. Health Data Management."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2667639"},{"key":"e_1_3_2_2_18_1","unstructured":"Sang-Phil Lim. 2016. The Jasmine OpenSSD Platform: Technical Reference Manual (v1.4 in English). http:\/\/www.openssd-project.org\/mediawiki\/images\/Jasmine_Tech_Ref_Manual_v.1.4e.pdf.  Sang-Phil Lim. 2016. The Jasmine OpenSSD Platform: Technical Reference Manual (v1.4 in English). http:\/\/www.openssd-project.org\/mediawiki\/images\/Jasmine_Tech_Ref_Manual_v.1.4e.pdf."},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES).","author":"Mercaldo F.","unstructured":"F. Mercaldo , V. Nardone , and A. Santone . 2016. Ransomware Inside Out . In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES). F. Mercaldo, V. Nardone, and A. Santone. 2016. Ransomware Inside Out. In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES)."},{"key":"e_1_3_2_2_20_1","unstructured":"Micron. 2016. Protecting Your SSD and Your Data. https:\/\/www.datasheetarchive.com\/whats_new\/1c1a884377ab1954f2efc54b614636ec.html.  Micron. 2016. Protecting Your SSD and Your Data. https:\/\/www.datasheetarchive.com\/whats_new\/1c1a884377ab1954f2efc54b614636ec.html."},{"key":"e_1_3_2_2_21_1","unstructured":"Inc Micron Technology. 2017. FIPS 140--2 Cryptographic Module Non-Proprietary Security Policy. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-module-validation-program\/documents\/security-policies\/140sp2848.pdf.  Inc Micron Technology. 2017. FIPS 140--2 Cryptographic Module Non-Proprietary Security Policy. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-module-validation-program\/documents\/security-policies\/140sp2848.pdf."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"e_1_3_2_2_23_1","unstructured":"Mercora Technologies. 2017. HMAC SHA-256 Fast IP Core. http:\/\/www.mercoratech.com\/products\/hmac-sha256-fast-core.  Mercora Technologies. 2017. HMAC SHA-256 Fast IP Core. http:\/\/www.mercoratech.com\/products\/hmac-sha256-fast-core."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX . In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC 17) . Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC 17)."},{"key":"e_1_3_2_2_25_1","volume-title":"WIPER MALWARE: ATTACKING FROM INSIDE. https:\/\/talos-intelligence-site.s3.amazonaws.com\/production\/document_files\/files\/000\/033\/904\/original\/Talos_WiperWhitepaper.v3.pdf.","author":"VENTURA","year":"2018","unstructured":"VENTURA VITOR. 2018 . WIPER MALWARE: ATTACKING FROM INSIDE. https:\/\/talos-intelligence-site.s3.amazonaws.com\/production\/document_files\/files\/000\/033\/904\/original\/Talos_WiperWhitepaper.v3.pdf. VENTURA VITOR. 2018. WIPER MALWARE: ATTACKING FROM INSIDE. https:\/\/talos-intelligence-site.s3.amazonaws.com\/production\/document_files\/files\/000\/033\/904\/original\/Talos_WiperWhitepaper.v3.pdf."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303983"},{"key":"e_1_3_2_2_27_1","unstructured":"Wikipedia. 2018. Trusted Execution Environment. https:\/\/en.wikipedia.org\/wiki\/Trusted_execution_environment.  Wikipedia. 2018. Trusted Execution Environment. https:\/\/en.wikipedia.org\/wiki\/Trusted_execution_environment."},{"key":"e_1_3_2_2_28_1","unstructured":"Wikipedia. 2019 a. List of solid-state drive manufacturers. https:\/\/en.wikipedia.org\/wiki\/List_of_solid-state_drive_manufacturers.  Wikipedia. 2019 a. List of solid-state drive manufacturers. https:\/\/en.wikipedia.org\/wiki\/List_of_solid-state_drive_manufacturers."},{"key":"e_1_3_2_2_29_1","unstructured":"Wikipedia. 2019 b. Message authentication code. https:\/\/en.wikipedia.org\/wiki\/Message_authentication_code.  Wikipedia. 2019 b. Message authentication code. https:\/\/en.wikipedia.org\/wiki\/Message_authentication_code."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23197"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384717"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":30,"alternative-id":["10.1145\/3320269.3384717","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384717","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}