{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:44:30Z","timestamp":1772041470291,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Huawei Innovation Research Program Flagship 2018"},{"name":"HK RGC GRF","award":["17202318, 17207117"],"award-info":[{"award-number":["17202318, 17207117"]}]},{"name":"HK RGC ECS","award":["27200916"],"award-info":[{"award-number":["27200916"]}]},{"name":"Croucher innovation award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384763","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"826-840","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Uranus"],"prefix":"10.1145","author":[{"given":"Jianyu","family":"Jiang","sequence":"first","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Xusheng","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"TszOn","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Tianxiang","family":"Shen","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Shixiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Cho-Li","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Apache Storm. http:\/\/storm.apache.org\/.  Apache Storm. http:\/\/storm.apache.org\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Apache Tomcat. http:\/\/tomcat.apache.org\/.  Apache Tomcat. http:\/\/tomcat.apache.org\/."},{"key":"e_1_3_2_2_3_1","unstructured":"ChronicleMap. https:\/\/github.com\/OpenHFT\/Chronicle-Map.  ChronicleMap. https:\/\/github.com\/OpenHFT\/Chronicle-Map."},{"key":"e_1_3_2_2_4_1","unstructured":"Corda SGX JVM. https:\/\/github.com\/corda\/sgxjvm-public.  Corda SGX JVM. https:\/\/github.com\/corda\/sgxjvm-public."},{"key":"e_1_3_2_2_5_1","unstructured":"Java ASM Package. https:\/\/asm.ow2.io\/.  Java ASM Package. https:\/\/asm.ow2.io\/."},{"key":"e_1_3_2_2_6_1","unstructured":"JVM Runtime. http:\/\/openjdk.java.net\/groups\/hotspot\/docs\/RuntimeOverview.html.  JVM Runtime. http:\/\/openjdk.java.net\/groups\/hotspot\/docs\/RuntimeOverview.html."},{"key":"e_1_3_2_2_7_1","unstructured":"The Jython Project. www.jython.org.  The Jython Project. www.jython.org."},{"key":"e_1_3_2_2_8_1","unstructured":"Multi-threaded JavaScript on the JVM. ringojs.org.  Multi-threaded JavaScript on the JVM. ringojs.org."},{"key":"e_1_3_2_2_9_1","unstructured":"SecureWorker. https:\/\/www.npmjs.com\/package\/secureworker.  SecureWorker. https:\/\/www.npmjs.com\/package\/secureworker."},{"key":"e_1_3_2_2_10_1","unstructured":"SGX-LKL. https:\/\/github.com\/lsds\/sgx-lkl.  SGX-LKL. https:\/\/github.com\/lsds\/sgx-lkl."},{"key":"e_1_3_2_2_11_1","unstructured":"SGX-Spark. https:\/\/github.com\/lsds\/sgx-spark.  SGX-Spark. https:\/\/github.com\/lsds\/sgx-spark."},{"key":"e_1_3_2_2_12_1","unstructured":"SpiderMonkey.https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey.  SpiderMonkey.https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey."},{"key":"e_1_3_2_2_13_1","unstructured":"ZooKeeper. https:\/\/zookeeper.apache.org\/.  ZooKeeper. https:\/\/zookeeper.apache.org\/."},{"key":"e_1_3_2_2_14_1","unstructured":"Zookeeper Smoketest. https:\/\/github.com\/phunt\/zk-smoketest.  Zookeeper Smoketest. https:\/\/github.com\/phunt\/zk-smoketest."},{"key":"e_1_3_2_2_15_1","unstructured":"Handling segfault in SGX enclaves. https:\/\/software.intel.com\/en-us\/forums\/intel-software-guard-extensions-intel-sgx\/topic\/734597.  Handling segfault in SGX enclaves. https:\/\/software.intel.com\/en-us\/forums\/intel-software-guard-extensions-intel-sgx\/topic\/734597."},{"key":"e_1_3_2_2_16_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Civet","unstructured":"Civet : An Efficient Java Partitioning Framework for Hardware Enclaves . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/tsai Civet: An Efficient Java Partitioning Framework for Hardware Enclaves. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/tsai"},{"key":"e_1_3_2_2_17_1","unstructured":"ARM. Security technology building a secure system using Trust Zone technology(white paper).  ARM. Security technology building a secure system using Trust Zone technology(white paper)."},{"key":"e_1_3_2_2_18_1","unstructured":"Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'Keeffe Mark Still-well et al. SCONE: Secure Linux Containers with Intel SGX. In OSDI. 689--703.  Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'Keeffe Mark Still-well et al. SCONE: Secure Linux Containers with Intel SGX. In OSDI. 689--703."},{"key":"e_1_3_2_2_19_1","volume-title":"DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17--21, 2019, Proceedings. Springer, 91","author":"Aublin Pierre-Louis","unstructured":"Pierre-Louis Aublin , Peter Pietzuch , and Valerio Schiavoni . Using Trusted Execution Environments for Secure Stream Processing of Medical Data. In Distributed Applications and Interoperable Systems: 19th IFIP WG 6.1 International Conference , DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17--21, 2019, Proceedings. Springer, 91 . Pierre-Louis Aublin, Peter Pietzuch, and Valerio Schiavoni. Using Trusted Execution Environments for Secure Stream Processing of Medical Data. In Distributed Applications and Interoperable Systems: 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17--21, 2019, Proceedings. Springer, 91."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 2018International Symposium on Code Generation and Optimization. ACM, 75--86","author":"Bauman Erick","unstructured":"Erick Bauman , Huibo Wang , Mingwei Zhang , and Zhiqiang Lin . SGXElide:enabling enclave code secrecy via self-modification . In Proceedings of the 2018International Symposium on Code Generation and Optimization. ACM, 75--86 . Erick Bauman, Huibo Wang, Mingwei Zhang, and Zhiqiang Lin. SGXElide:enabling enclave code secrecy via self-modification. In Proceedings of the 2018International Symposium on Code Generation and Optimization. ACM, 75--86."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the Eleventh Symposium on Operating Systems Design and Implementation (OSDI '14)","author":"Baumann Andrew","unstructured":"Andrew Baumann , Marcus Peinado , and Galen Hunt . Shielding Applications from an Untrusted Cloud with Haven . In Proceedings of the Eleventh Symposium on Operating Systems Design and Implementation (OSDI '14) . 267--283. Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding Applications from an Untrusted Cloud with Haven. In Proceedings of the Eleventh Symposium on Operating Systems Design and Implementation (OSDI '14). 267--283."},{"key":"e_1_3_2_2_22_1","volume-title":"International Workshop on Embedded Software. Springer, 289--305","author":"Beebee William S","unstructured":"William S Beebee and Martin Rinard . An implementation of scoped memory for Real-Time Java . In International Workshop on Embedded Software. Springer, 289--305 . William S Beebee and Martin Rinard. An implementation of scoped memory for Real-Time Java. In International Workshop on Embedded Software. Springer, 289--305."},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications (Portland, Oregon, USA)(OOPSLA '14)","author":"Bell Jonathan","unstructured":"Jonathan Bell and Gail Kaiser . Phosphor: Illuminating Dynamic Data Flow in Commodity Jvms . In Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications (Portland, Oregon, USA)(OOPSLA '14) . ACM , New York, NY, USA , 83--101. Jonathan Bell and Gail Kaiser. Phosphor: Illuminating Dynamic Data Flow in Commodity Jvms. In Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications (Portland, Oregon, USA)(OOPSLA '14). ACM, New York, NY, USA, 83--101."},{"key":"e_1_3_2_2_24_1","volume-title":"Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th USENIX Security Symposium USENIX Security 18)","author":"Biondo Andrea","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th USENIX Security Symposium USENIX Security 18) . 1213--1227. Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th USENIX Security Symposium USENIX Security 18). 1213--1227."},{"key":"e_1_3_2_2_25_1","unstructured":"Rick Boivie and Peter Williams. SecureBlue++: CPU support for secure execution. Technical report(2012).  Rick Boivie and Peter Williams. SecureBlue++: CPU support for secure execution. Technical report(2012)."},{"key":"e_1_3_2_2_26_1","volume-title":"ACM SIGPLAN Notices","author":"Boyapati Chandrasekhar","unstructured":"Chandrasekhar Boyapati , Alexandru Salcianu , William Beebee Jr, and Martin Rinard. Ownership types for safe region-based memory management in real-time Java . In ACM SIGPLAN Notices , Vol. 38 . ACM , 324--337. Chandrasekhar Boyapati, Alexandru Salcianu, William Beebee Jr, and Martin Rinard. Ownership types for safe region-based memory management in real-time Java. In ACM SIGPLAN Notices, Vol. 38. ACM, 324--337."},{"key":"e_1_3_2_2_27_1","unstructured":"Ferdinand Brasser David Gens Patrick Jauernig Ahmad-Reza Sadeghi and Emmanuel Stapf. SANCTUARY: ARMing TrustZone with User-space Enclaves. In NDSS.  Ferdinand Brasser David Gens Patrick Jauernig Ahmad-Reza Sadeghi and Emmanuel Stapf. SANCTUARY: ARMing TrustZone with User-space Enclaves. In NDSS."},{"key":"e_1_3_2_2_28_1","unstructured":"Stefan Brenner Colin Wulf David Goltzsche Nico Weichbrodt Matthias Lorenz Christof Fetzer Peter R Pietzuch and R\u00fcdiger Kapitza. SecureKeeper: Confidential Zoo Keeper using Intel SGX. In Middleware. 14.  Stefan Brenner Colin Wulf David Goltzsche Nico Weichbrodt Matthias Lorenz Christof Fetzer Peter R Pietzuch and R\u00fcdiger Kapitza. SecureKeeper: Confidential Zoo Keeper using Intel SGX. In Middleware. 14."},{"key":"e_1_3_2_2_29_1","volume-title":"Iago attacks: Why the system call apiis a bad untrusted rpc interface","author":"Checkoway Stephen","unstructured":"Stephen Checkoway and Hovav Shacham . Iago attacks: Why the system call apiis a bad untrusted rpc interface . Vol. 41 . ACM. Stephen Checkoway and Hovav Shacham. Iago attacks: Why the system call apiis a bad untrusted rpc interface. Vol. 41. ACM."},{"key":"e_1_3_2_2_30_1","volume-title":"Srinivas Devadas. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In USENIX Security Symposium. 857--874","author":"Costan Victor","unstructured":"Victor Costan , Ilia A Lebedev , and Srinivas Devadas. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In USENIX Security Symposium. 857--874 . Victor Costan, Ilia A Lebedev, and Srinivas Devadas. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In USENIX Security Symposium. 857--874."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles. ACM,287--305","author":"Ferraiuolo Andrew","unstructured":"Andrew Ferraiuolo , Andrew Baumann , Chris Hawblitzel , and Bryan Parno . Ko-modo : Using verification to disentangle secure-enclave hardware from software . In Proceedings of the 26th Symposium on Operating Systems Principles. ACM,287--305 . Andrew Ferraiuolo, Andrew Baumann, Chris Hawblitzel, and Bryan Parno. Ko-modo: Using verification to disentangle secure-enclave hardware from software. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM,287--305."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Tommaso Frassetto David Gens Christopher Liebchen and Ahmad-Reza Sadeghi. JIT Guard: Hardening Just-in-time Compilers with SGX. (2017).  Tommaso Frassetto David Gens Christopher Liebchen and Ahmad-Reza Sadeghi. JIT Guard: Hardening Just-in-time Compilers with SGX. (2017).","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_2_34_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Ghosn Adrien","unstructured":"Adrien Ghosn , James R Larus , and Edouard Bugnion . Secured routines: language-based construction of trusted execution environments . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . 571--586. Adrien Ghosn, James R Larus, and Edouard Bugnion. Secured routines: language-based construction of trusted execution environments. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 571--586."},{"key":"e_1_3_2_2_35_1","first-page":"12","article-title":"Differential Privacy","volume":"8","author":"Hu Xueyang","year":"2015","unstructured":"Xueyang Hu , Mingxuan Yuan , Jianguo Yao , Yu Deng , Lei Chen , Qiang Yang , Haibing Guan , and Jia Zeng . Differential Privacy in Telco Big Data Platform. Proc. VLDB Endow . 8 , 12 ( Aug. 2015 ), 1692--1703. Xueyang Hu, Mingxuan Yuan, Jianguo Yao, Yu Deng, Lei Chen, Qiang Yang,Haibing Guan, and Jia Zeng. Differential Privacy in Telco Big Data Platform. Proc. VLDB Endow.8, 12 (Aug. 2015), 1692--1703.","journal-title":"Telco Big Data Platform. Proc. VLDB Endow"},{"key":"e_1_3_2_2_36_1","volume-title":"Benjamin Reed. ZooKeeper: Wait-free Coordination for Internet-scale Systems. In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIXATC'10)","author":"Hunt Patrick","unstructured":"Patrick Hunt , Mahadev Konar , Flavio P. Junqueira , and Benjamin Reed. ZooKeeper: Wait-free Coordination for Internet-scale Systems. In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIXATC'10) . Patrick Hunt, Mahadev Konar, Flavio P. Junqueira, and Benjamin Reed. ZooKeeper: Wait-free Coordination for Internet-scale Systems. In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIXATC'10)."},{"key":"e_1_3_2_2_37_1","unstructured":"Tyler Hunt Zhiting Zhu Yuanzhong Xu Simon Peter and Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In OSDI. 533--549.  Tyler Hunt Zhiting Zhu Yuanzhong Xu Simon Peter and Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In OSDI. 533--549."},{"key":"e_1_3_2_2_38_1","unstructured":"Intel. Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/329298-001.pdf.  Intel. Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/329298-001.pdf."},{"key":"e_1_3_2_2_39_1","unstructured":"Prerit Jain Soham Jayesh Desai Ming-Wei Shih Taesoo Kim Seong Min Kim Jae-Hyuk Lee Changho Choi Youjung Shin Brent Byunghoon Kang and DongsuHan. OpenSGX: An Open Platform for SGX Research. In NDSS.  Prerit Jain Soham Jayesh Desai Ming-Wei Shih Taesoo Kim Seong Min Kim Jae-Hyuk Lee Changho Choi Youjung Shin Brent Byunghoon Kang and DongsuHan. OpenSGX: An Open Platform for SGX Research. In NDSS."},{"key":"e_1_3_2_2_40_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC '17)","author":"Jianyu Jiang","unstructured":"Jiang Jianyu , Zhao Shixiong , Alsayed Danish , Wang Yuexuan , Cui Heming , Liang Feng , and Gu Zhaoquan . Kakute : A Precise, Unified Information Flow Analysis System for Big-data Security . In Proceedings of the Annual Computer Security Applications Conference (ACSAC '17) . Jiang Jianyu, Zhao Shixiong, Alsayed Danish, Wang Yuexuan, Cui Heming, Liang Feng, and Gu Zhaoquan. Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. In Proceedings of the Annual Computer Security Applications Conference (ACSAC '17)."},{"key":"e_1_3_2_2_41_1","volume-title":"Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services.White Paper1","author":"Johnson Simon","year":"2016","unstructured":"Simon Johnson , Vinnie Scarlata , Carlos Rozas , Ernie Brickell , and Frank Mckeen . Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services.White Paper1 ( 2016 ), 1--10. Simon Johnson, Vinnie Scarlata, Carlos Rozas, Ernie Brickell, and Frank Mckeen. Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services.White Paper1 (2016), 1--10."},{"key":"e_1_3_2_2_42_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. AMD memory encryption. Whitepaper(2016).  David Kaplan Jeremy Powell and Tom Woller. AMD memory encryption. Whitepaper(2016)."},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 19--30","author":"Karande Vishal","unstructured":"Vishal Karande , Erick Bauman , Zhiqiang Lin , and Latifur Khan . SGX-Log : Securing system logs with SGX . In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 19--30 . Vishal Karande, Erick Bauman, Zhiqiang Lin, and Latifur Khan. SGX-Log: Securing system logs with SGX. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 19--30."},{"key":"e_1_3_2_2_44_1","volume-title":"SSS'17: Safety-critical Systems Symposium","author":"K\u00e4stner Daniel","year":"2017","unstructured":"Daniel K\u00e4stner , Xavier Leroy , Sandrine Blazy , Bernhard Schommer , Michael Schmidt , and Christian Ferdinand . Closing the gap--the formally verified opti-mizing compiler Comp Cert . In SSS'17: Safety-critical Systems Symposium 2017 . Create Space, 163--180. Daniel K\u00e4stner, Xavier Leroy, Sandrine Blazy, Bernhard Schommer, Michael Schmidt, and Christian Ferdinand. Closing the gap--the formally verified opti-mizing compiler Comp Cert. In SSS'17: Safety-critical Systems Symposium 2017. Create Space, 163--180."},{"key":"e_1_3_2_2_45_1","unstructured":"Seong Min Kim Juhyeng Han Jaehyeong Ha Taesoo Kim and Dongsu Han. Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. In NSDI. 145--161.  Seong Min Kim Juhyeng Han Jaehyeong Ha Taesoo Kim and Dongsu Han. Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. In NSDI. 145--161."},{"key":"e_1_3_2_2_46_1","volume-title":"Jaehyuk Huh. Shield Store: Shielded In-memory Key-value Storage with SGX. In Proceedings of the Fourteenth EuroSys Conference","author":"Kim Taehoon","year":"2019","unstructured":"Taehoon Kim , Joongun Park , Jaewook Woo , Seungheun Jeon , and Jaehyuk Huh. Shield Store: Shielded In-memory Key-value Storage with SGX. In Proceedings of the Fourteenth EuroSys Conference 2019 . ACM, 14. Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. Shield Store: Shielded In-memory Key-value Storage with SGX. In Proceedings of the Fourteenth EuroSys Conference 2019. ACM, 14."},{"key":"e_1_3_2_2_47_1","volume-title":"Christof Fetzer. Pesos: Policy Enhanced Secure Object Store. In Proceedings of the Twelfth European Conference on Computer Systems(EuroSys).","author":"Krahn Robert","unstructured":"Robert Krahn , Bohdan Trach , Anjo Vahldiek-Oberwagner , Thomas Knauth , Pramod Bhatotia , and Christof Fetzer. Pesos: Policy Enhanced Secure Object Store. In Proceedings of the Twelfth European Conference on Computer Systems(EuroSys). Robert Krahn, Bohdan Trach, Anjo Vahldiek-Oberwagner, Thomas Knauth, Pramod Bhatotia, and Christof Fetzer. Pesos: Policy Enhanced Secure Object Store. In Proceedings of the Twelfth European Conference on Computer Systems(EuroSys)."},{"key":"e_1_3_2_2_48_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Jaehyuk","unstructured":"Jaehyuk Lee , Jinsoo Jang , Yeongjin Jang , Nohyun Kwak , Yeseul Choi , ChanghoChoi, Taesoo Kim , Marcus Peinado , and Brent Byung Hoon Kang . Hacking in darkness: Return-oriented programming against secure enclaves . In 26th USENIX Security Symposium (USENIX Security 17) . 523--539. Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, ChanghoChoi, Taesoo Kim, Marcus Peinado, and Brent Byung Hoon Kang. Hacking in darkness: Return-oriented programming against secure enclaves. In 26th USENIX Security Symposium (USENIX Security 17). 523--539."},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the 50th IEEE\/IFIP International Conference on Dependable Systems and Networks(DSN '20)","author":"Li Tsz On","unstructured":"Tsz On Li , Jianyu Jiang , Ji Qi , Chi Chiu So , Jiacheng Ma , Xusheng Chen , Tianxiang Shen , Heming Cui , Yuexuan Wang , and Peng Wang . UPA : An Automated, Accurate and Efficient Differentially Private Big-data Mining System . In Proceedings of the 50th IEEE\/IFIP International Conference on Dependable Systems and Networks(DSN '20) . Tsz On Li, Jianyu Jiang, Ji Qi, Chi Chiu So, Jiacheng Ma, Xusheng Chen, Tianxiang Shen, Heming Cui, Yuexuan Wang, and Peng Wang. UPA: An Automated, Accurate and Efficient Differentially Private Big-data Mining System. In Proceedings of the 50th IEEE\/IFIP International Conference on Dependable Systems and Networks(DSN '20)."},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX Annual Technical Conference. 409--420","author":"Li Yanlin","unstructured":"Yanlin Li , Jonathan M McCune , James Newsome , Adrian Perrig , Brandon Baker ,and Will Drewry . MiniBox : A Two-Way Sandbox for x86 Native Code . In USENIX Annual Technical Conference. 409--420 . Yanlin Li, Jonathan M McCune, James Newsome, Adrian Perrig, Brandon Baker,and Will Drewry. MiniBox: A Two-Way Sandbox for x86 Native Code. In USENIX Annual Technical Conference. 409--420."},{"key":"e_1_3_2_2_51_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Lind Joshua","unstructured":"Joshua Lind , Christian Priebe , Divya Muthukumaran , Dan O'Keeffe , Pierre-Louis Aublin , Florian Kelbert , Tobias Reiher , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , : Automatic application partitioning for Intel SGX . In 2017 USENIX Annual Technical Conference (USENIX ATC 17) , Santa Clara, CA. Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, et al. Glamdring: Automatic application partitioning for Intel SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737965"},{"key":"e_1_3_2_2_53_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. IACR Cryptology ePrint Archive2017","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . ROTE: Rollback Protection for Trusted Execution. IACR Cryptology ePrint Archive2017 ( 2017 ), 48. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. ROTE: Rollback Protection for Trusted Execution. IACR Cryptology ePrint Archive2017 (2017), 48."},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of The 35th Annual Computer Security Applications Conference (ACSAC'19)","author":"Mofrad Saeid","unstructured":"Saeid Mofrad , Ishtiaq Ahmed , Shiyong Lu , Ping Yang , Heming Cui , and Feng-wei Zhang. SecDATAVIEW : a secure big data workflow management system for heterogeneous computing environments . In Proceedings of The 35th Annual Computer Security Applications Conference (ACSAC'19) . Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, and Feng-wei Zhang. SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. In Proceedings of The 35th Annual Computer Security Applications Conference (ACSAC'19)."},{"key":"e_1_3_2_2_55_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Nguyen Khanh","unstructured":"Khanh Nguyen , Lu Fang , Guoqing Xu , Brian Demsky , Shan Lu , Sanazsadat Alamian , and Onur Mutlu . Yak : A high-performance big-data-friendly garbage collector . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 349--365. Khanh Nguyen, Lu Fang, Guoqing Xu, Brian Demsky, Shan Lu, Sanazsadat Alamian, and Onur Mutlu. Yak: A high-performance big-data-friendly garbage collector. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 349--365."},{"key":"e_1_3_2_2_56_1","volume-title":"Proceedings of the 2018 IEEE Symposium on Security and Privacy. IEEE, 0.","author":"Priebe Christian","unstructured":"Christian Priebe , Kapil Vaswani , and Manuel Costa . EnclaveDB : A Secure Data-base using SGX . In Proceedings of the 2018 IEEE Symposium on Security and Privacy. IEEE, 0. Christian Priebe, Kapil Vaswani, and Manuel Costa. EnclaveDB: A Secure Data-base using SGX. In Proceedings of the 2018 IEEE Symposium on Security and Privacy. IEEE, 0."},{"key":"e_1_3_2_2_57_1","volume-title":"Automated partitioning of android applications for trusted execution environments","author":"Rubinov Konstantin","unstructured":"Konstantin Rubinov , Lucia Rosculete , Tulika Mitra , and Abhik Roychoudhury . Automated partitioning of android applications for trusted execution environments . In ICSE. IEEE , 923--934. Konstantin Rubinov, Lucia Rosculete, Tulika Mitra, and Abhik Roychoudhury. Automated partitioning of android applications for trusted execution environments. In ICSE. IEEE, 923--934."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541949"},{"key":"e_1_3_2_2_59_1","volume-title":"Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 38--54","author":"Schuster Felix","unstructured":"Felix Schuster , Manuel Costa , C\u00e9dric Fournet , Christos Gkantsidis , MarcusPeinado, Gloria Mainar-Ruiz , and Mark Russinovich . VC3 : Trustworthy data analytics in the cloud using SGX . In Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 38--54 . Felix Schuster, Manuel Costa, C\u00e9dric Fournet, Christos Gkantsidis, MarcusPeinado, Gloria Mainar-Ruiz, and Mark Russinovich. VC3: Trustworthy data analytics in the cloud using SGX. In Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 38--54."},{"key":"e_1_3_2_2_60_1","volume-title":"Latifur Khan. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)","author":"Shaon Fahad","unstructured":"Fahad Shaon , Murat Kantarcioglu , Zhiqiang Lin , and Latifur Khan. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10) . Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, and Latifur Khan. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)."},{"key":"e_1_3_2_2_61_1","volume-title":"Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 45--48","author":"Shih Ming-Wei","unstructured":"Ming-Wei Shih , Mohan Kumar , Taesoo Kim , and Ada Gavrilovska . S-NFV : Se-curing NFV states by using SGX . In Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 45--48 . Ming-Wei Shih, Mohan Kumar, Taesoo Kim, and Ada Gavrilovska. S-NFV: Se-curing NFV states by using SGX. In Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 45--48."},{"key":"e_1_3_2_2_62_1","volume-title":"Prateek Saxena. PANOPLY: Low-TCB Linux Applications With SGX Enclaves. In Proc. of the Annual Network and Distributed System Security Symp.(NDSS).","author":"Shinde Shweta","unstructured":"Shweta Shinde , Dat Le Tien , Shruti Tople , and Prateek Saxena. PANOPLY: Low-TCB Linux Applications With SGX Enclaves. In Proc. of the Annual Network and Distributed System Security Symp.(NDSS). Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. PANOPLY: Low-TCB Linux Applications With SGX Enclaves. In Proc. of the Annual Network and Distributed System Security Symp.(NDSS)."},{"key":"e_1_3_2_2_63_1","first-page":"2007","article-title":"Heap feng shui in javascript","author":"Sotirov Alexander","year":"2007","unstructured":"Alexander Sotirov . Heap feng shui in javascript . Black Hat Europe 2007 ( 2007 ). Alexander Sotirov. Heap feng shui in javascript. Black Hat Europe 2007 (2007).","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_2_64_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2435--2450","author":"Subramanyan Pramod","unstructured":"Pramod Subramanyan , Rohit Sinha , Ilia Lebedev , Srinivas Devadas , and Sanjit A Seshia . A formal foundation for secure remote execution of enclaves . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2435--2450 . Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, and Sanjit A Seshia. A formal foundation for secure remote execution of enclaves. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2435--2450."},{"key":"e_1_3_2_2_65_1","unstructured":"Yogesh Swami. Intel SGX Remote Attestation is not sufficient. IACR(2017).  Yogesh Swami. Intel SGX Remote Attestation is not sufficient. IACR(2017)."},{"key":"e_1_3_2_2_66_1","volume-title":"Shoumeng Yan. SGX Kernel: A Library Operating System Optimized for Intel SGX. In Proceedings of the Computing Frontiers Conference. ACM, 35--44","author":"Tian Hongliang","unstructured":"Hongliang Tian , Yong Zhang , Chunxiao Xing , and Shoumeng Yan. SGX Kernel: A Library Operating System Optimized for Intel SGX. In Proceedings of the Computing Frontiers Conference. ACM, 35--44 . Hongliang Tian, Yong Zhang, Chunxiao Xing, and Shoumeng Yan. SGX Kernel: A Library Operating System Optimized for Intel SGX. In Proceedings of the Computing Frontiers Conference. ACM, 35--44."},{"key":"e_1_3_2_2_67_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC).","author":"Tsai Chia-Che","unstructured":"Chia-Che Tsai , Donald E Porter , and Mona Vij . Graphene-SGX : A practical library OS for unmodified applications on SGX . In 2017 USENIX Annual Technical Conference (USENIX ATC). Chia-Che Tsai, Donald E Porter, and Mona Vij. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_2_68_1","volume-title":"Frank Piessens. A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Bulck Jo Van","unstructured":"Jo Van Bulck , David Oswald , Eduard Marin , Abdulla Aldoseri , Flavio D. Garcia ,and Frank Piessens. A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ( London, United Kingdom)(CCS '19). Association for Computing Machinery, New York, NY, USA, 1741--1758. Jo Van Bulck, David Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia,and Frank Piessens. A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security(London, United Kingdom)(CCS '19). Association for Computing Machinery, New York, NY, USA, 1741--1758."},{"key":"e_1_3_2_2_69_1","volume-title":"Proceedings of the 2nd Workshop on System Software for Trusted Execution. ACM, 4.","author":"Bulck Jo Van","unstructured":"Jo Van Bulck , Frank Piessens , and Raoul Strackx . SGX-Step : A practical at-tack framework for precise enclave execution control . In Proceedings of the 2nd Workshop on System Software for Trusted Execution. ACM, 4. Jo Van Bulck, Frank Piessens, and Raoul Strackx. SGX-Step: A practical at-tack framework for precise enclave execution control. In Proceedings of the 2nd Workshop on System Software for Trusted Execution. ACM, 4."},{"key":"e_1_3_2_2_70_1","volume-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, 114--121","author":"Wang Huibo","unstructured":"Huibo Wang , Erick Bauman , Vishal Karande , Zhiqiang Lin , Yueqiang Cheng , and Yinqian Zhang . Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach . In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, 114--121 . Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, and Yinqian Zhang. Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, 114--121."},{"key":"e_1_3_2_2_71_1","volume-title":"Zhiqiang Lin. Towards Memory Safe Enclave Programming with Rust-SGX. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Wang Huibo","unstructured":"Huibo Wang , Pei Wang , Yu Ding , Mingshen Sun , Yiming Jing , Ran Duan , Long Li , Yulong Zhang , Tao Wei , and Zhiqiang Lin. Towards Memory Safe Enclave Programming with Rust-SGX. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ( London, United Kingdom)(CCS '19). Association for Computing Machinery, New York, NY, USA, 2333--2350. Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, and Zhiqiang Lin. Towards Memory Safe Enclave Programming with Rust-SGX. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security(London, United Kingdom)(CCS '19). Association for Computing Machinery, New York, NY, USA, 2333--2350."},{"key":"e_1_3_2_2_72_1","volume-title":"European Symposiumon Research in Computer Security. Springer, 440--457","author":"Weichbrodt Nico","unstructured":"Nico Weichbrodt , Anil Kurmus , Peter Pietzuch , and R\u00fcdiger Kapitza . AsyncShock : Exploiting synchronisation bugs in Intel SGX enclaves . In European Symposiumon Research in Computer Security. Springer, 440--457 . Nico Weichbrodt, Anil Kurmus, Peter Pietzuch, and R\u00fcdiger Kapitza. AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves. In European Symposiumon Research in Computer Security. Springer, 440--457."},{"key":"e_1_3_2_2_73_1","unstructured":"Samuel Weiser Mario Werner Ferdinand Brasser Maja Malenko Stefan Mangard and Ahmad-Reza Sadeghi. TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.  Samuel Weiser Mario Werner Ferdinand Brasser Maja Malenko Stefan Mangard and Ahmad-Reza Sadeghi. TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806610"},{"key":"e_1_3_2_2_75_1","unstructured":"Min Hong Yun and Lin Zhong. Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. In NDSS.  Min Hong Yun and Lin Zhong. Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. In NDSS."},{"key":"e_1_3_2_2_76_1","volume-title":"Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing","author":"Zaharia Matei","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauley , Michael J Franklin , Scott Shenker , and Ion Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In NSDI. USENIX Association , 2--2. Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J Franklin, Scott Shenker, and Ion Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In NSDI. USENIX Association, 2--2."},{"key":"e_1_3_2_2_77_1","unstructured":"Wenting Zheng Ankur Dave Jethro G Beekman Raluca Ada Popa Joseph EGonzalez and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298.  Wenting Zheng Ankur Dave Jethro G Beekman Raluca Ada Popa Joseph EGonzalez and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384763"}},"subtitle":["Simple, Efficient SGX Programming and its Applications"],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":77,"alternative-id":["10.1145\/3320269.3384763","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384763","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}