{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T12:42:24Z","timestamp":1769085744412,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387552","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Oblivious coopetitive analytics using hardware enclaves"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Dave","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"Chester","family":"Leung","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Joseph E.","family":"Gonzalez","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. SIGMOD Rec. (2000).  Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. SIGMOD Rec. (2000).","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR)","author":"Arasu Arvind","year":"2013"},{"key":"e_1_3_2_1_3_1","unstructured":"ARM. [n.d.]. TrustZone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone.  ARM. [n.d.]. TrustZone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"e_1_3_2_1_5_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016"},{"key":"e_1_3_2_1_6_1","volume-title":"Hash Revisited. Proc. VLDB Endow.","author":"Balkesen Cagri","year":"2013"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_1_14_1","unstructured":"Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT.  Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT."},{"key":"e_1_3_2_1_15_1","volume-title":"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security.","author":"Bulck Jo Van","year":"2018"},{"key":"e_1_3_2_1_16_1","unstructured":"Jo Van Bulck Nico Weichbrodt R\u00fcdiger Kapitza Frank Piessens and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In USENIX SECURITY.  Jo Van Bulck Nico Weichbrodt R\u00fcdiger Kapitza Frank Piessens and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In USENIX SECURITY."},{"key":"e_1_3_2_1_17_1","unstructured":"Centers for Medicare & Medicaid Services. 1996. The Health Insurance Portability and Accountability Act of 1996 (HIPAA). Online at http:\/\/www.cms.hhs.gov\/hipaa\/.  Centers for Medicare & Medicaid Services. 1996. The Health Insurance Portability and Accountability Act of 1996 (HIPAA). Online at http:\/\/www.cms.hhs.gov\/hipaa\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia","year":"2017"},{"key":"e_1_3_2_1_19_1","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS P).","author":"Chen Guoxing"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"e_1_3_2_1_21_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Corrigan-Gibbs Henry","year":"2017"},{"key":"e_1_3_2_1_22_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. Usenix Security Symposium. https:\/\/eprint.iacr.org\/2015\/564","author":"Costan Victor","year":"2016"},{"key":"e_1_3_2_1_23_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016"},{"key":"e_1_3_2_1_24_1","volume-title":"Hinke","author":"Delugach Harry S.","year":"1996"},{"key":"e_1_3_2_1_25_1","volume-title":"Scotiabank's chief risk officer on the state of anti-money laundering","author":"Eizenman Erez"},{"key":"e_1_3_2_1_26_1","volume-title":"An Oblivious General-Purpose SQL Database for the Cloud. CoRR abs\/1710.00458","author":"Eskandarian Saba","year":"2017"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_34"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816670"},{"key":"e_1_3_2_1_29_1","first-page":"152","article-title":"UnLynx: A Decentralized System for Privacy-Conscious Data Sharing","volume":"4","author":"Froelicher David","year":"2017","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"e_1_3_2_1_31_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_33_1","unstructured":"Rob Hall Stephen E. Fienberg and Yuval Nardi. 2011. Secure Multiple Linear Regression Based on Homomorphic Encryption.  Rob Hall Stephen E. Fienberg and Yuval Nardi. 2011. Secure Multiple Linear Regression Based on Homomorphic Encryption."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321427"},{"key":"e_1_3_2_1_36_1","volume-title":"Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Hunt Tyler","year":"2016"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_1_40_1","volume-title":"Chorus: Differential Privacy via Query Rewriting. CoRR abs\/1809.07750","author":"Johnson Noah M.","year":"2018"},{"key":"e_1_3_2_1_41_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. White paper.  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. White paper."},{"key":"e_1_3_2_1_42_1","volume-title":"Secure regression on distributed databases. Journal of Computational and Graphical Statistics","author":"Karr Alan F","year":"2005"},{"key":"e_1_3_2_1_43_1","unstructured":"Dayeol Lee Dongha Jung Ian T. Fang Chia-Che Tsai and Raluca Ada Popa. 2019. An Off-Chip Attack on Hardware Enclaves via the Memory Bus. arXiv:cs.CR\/1912.01701  Dayeol Lee Dongha Jung Ian T. Fang Chia-Che Tsai and Raluca Ada Popa. 2019. An Off-Chip Attack on Hardware Enclaves via the Memory Bus. arXiv:cs.CR\/1912.01701"},{"key":"e_1_3_2_1_44_1","volume-title":"Keystone: An Open Framework for Architecting Trusted Execution Environments. In European Conference on Computer Systems (Eurosys). https:\/\/keystone-enclave.org\/.","author":"Lee Dayeol","year":"2020"},{"key":"e_1_3_2_1_45_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Jaehyuk","year":"2017"},{"key":"e_1_3_2_1_46_1","unstructured":"Sangho Lee Ming-Wei Shih Prasun Gera Taesoo Kim Hyesoon Kim and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX SECURITY.  Sangho Lee Ming-Wei Shih Prasun Gera Taesoo Kim Hyesoon Kim and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX SECURITY."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/800057.808667"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_49_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Matetic Sinisa","year":"2017"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_51_1","volume-title":"Federated Learning of Deep Networks using Model Averaging. CoRR abs\/1602.05629","author":"McMahan H. Brendan","year":"2016"},{"key":"e_1_3_2_1_52_1","unstructured":"Microsoft. 2019. Always Encrypted Database Engine. https:\/\/msdn.microsoft.com\/en-us\/library\/mt163865.aspx.  Microsoft. 2019. Always Encrypted Database Engine. https:\/\/msdn.microsoft.com\/en-us\/library\/mt163865.aspx."},{"key":"e_1_3_2_1_53_1","volume-title":"Oblix: An Efficient Oblivious Search Index. In 2018 IEEE Symposium on Security and Privacy (SP). 279--296","author":"Mishra Pratyush","year":"2018"},{"key":"e_1_3_2_1_54_1","volume-title":"Memjam: A false dependency attack against constant-time crypto implementations. International Journal of Parallel Programming","author":"Moghimi Ahmad","year":"2019"},{"key":"e_1_3_2_1_55_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP).","author":"Mohassel Payman","year":"2017"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Narayan Arjun","year":"2012"},{"key":"e_1_3_2_1_58_1","volume-title":"Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. In 2013 IEEE Symposium on Security and Privacy.","author":"Nikolaenko Valeria","year":"2013"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813695"},{"key":"e_1_3_2_1_60_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016"},{"key":"e_1_3_2_1_61_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Oleksenko Oleksii","year":"2018"},{"key":"e_1_3_2_1_62_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Papadimitriou Antonis","year":"2016"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Parno Bryan"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE, 196--205","author":"Qian Xiaolei"},{"key":"e_1_3_2_1_66_1","volume-title":"Sylvain Pradervand, Edoardo Missiaglia, Olivier Michielin, Bryan Ford, and Jean-Pierre Hubaux.","author":"Raisaro Jean Louis","year":"2019"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Samuel Weiser Daniel Gruss Clementine Maurice and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA.  Michael Schwarz Samuel Weiser Daniel Gruss Clementine Maurice and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA.","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1994.283004"},{"key":"e_1_3_2_1_71_1","volume-title":"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Tang Adrian","year":"2017"},{"key":"e_1_3_2_1_72_1","volume-title":"Using verification to disentangle secure-enclave hardware from software","author":"Komodo","year":"2017"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"e_1_3_2_1_74_1","volume-title":"Gunter","author":"Wang Wenhao","year":"2017"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_77_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems","author":"Xu Yuanzhong"},{"key":"e_1_3_2_1_78_1","volume-title":"CacheBleed: a timing attack on OpenSSL constant-time RSA. Journal of Crypto-graphic Engineering","author":"Yarom Yuval","year":"2017"},{"key":"e_1_3_2_1_79_1","unstructured":"Matei Zaharia Mosharaf Chowdhury Tathagata Das Ankur Dave Justin Ma Murphy McCauley Michael J. Franklin Scott Shenker and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In NSDI.  Matei Zaharia Mosharaf Chowdhury Tathagata Das Ankur Dave Justin Ma Murphy McCauley Michael J. Franklin Scott Shenker and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In NSDI."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Mingyi Zhao Peng Liu and Jorge Lobo. 2015. Towards Collaborative Query Planning in Multi-party Database Networks. In Data and Applications Security and Privacy XXIX Pierangela Samarati (Ed.).  Mingyi Zhao Peng Liu and Jorge Lobo. 2015. Towards Collaborative Query Planning in Multi-party Database Networks. In Data and Applications Security and Privacy XXIX Pierangela Samarati (Ed.).","DOI":"10.1007\/978-3-319-20810-7_2"},{"key":"e_1_3_2_1_81_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017"},{"key":"e_1_3_2_1_82_1","volume-title":"Helen: Maliciously Secure Coopetitive Learning for Linear Models. In 2019 2019 IEEE Symposium on Security and Privacy (SP).","author":"Zheng Wenting","year":"2019"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","location":"Heraklion Greece","acronym":"EuroSys '20","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:22Z","timestamp":1750199602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":80,"alternative-id":["10.1145\/3342195.3387552","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387552","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}