{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:25Z","timestamp":1750220845765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365333","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A vision for autonomous blockchains backed by secure hardware"],"prefix":"10.1145","author":[{"given":"Kai","family":"Mast","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Lequn","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CIDR","author":"Arasu Arvind","year":"2013","unstructured":"Arvind Arasu , Spyros Blanas , Ken Eguro , Raghav Kaushik , Donald Kossmann , Ravishankar Ramamurthy , and Ramarathnam Venkatesan . Orthogonal Security with Cipherbase . CIDR , 2013 . Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, and Ramarathnam Venkatesan. Orthogonal Security with Cipherbase. CIDR, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/3035918.3064030","volume-title":"Proceedings of the 2017 ACM International Conference on Management of Data","author":"Arasu Arvind","year":"2017","unstructured":"Arvind Arasu , Ken Eguro , Raghav Kaushik , Donald Kossmann , Ping-fan Meng, Vineet Pandey , and Ravi Ramamurthy. Concerto: A High Concurrency Key-Value Store with Integrity . Proceedings of the 2017 ACM International Conference on Management of Data , pages 251 -- 266 , 2017 . Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ping-fan Meng, Vineet Pandey, and Ravi Ramamurthy. Concerto: A High Concurrency Key-Value Store with Integrity. Proceedings of the 2017 ACM International Conference on Management of Data, pages 251--266, 2017."},{"key":"e_1_3_2_1_3_1","first-page":"689","volume-title":"Christof Fetzer. SCONE: Secure Linux Containers with Intel SGX. Symposium on Operating System Design and Implementation","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer. SCONE: Secure Linux Containers with Intel SGX. Symposium on Operating System Design and Implementation , pages 689 -- 703 , Savannah, Georgia , November 2016 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. SCONE: Secure Linux Containers with Intel SGX. Symposium on Operating System Design and Implementation, pages 689--703, Savannah, Georgia, November 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"key":"e_1_3_2_1_5_1","volume-title":"The Sleepy Model of Consensus. IACR Cryptology ePrint Archive","author":"Bentov Iddo","year":"2016","unstructured":"Iddo Bentov , Rafael Pass , and Elaine Shi . The Sleepy Model of Consensus. IACR Cryptology ePrint Archive , 2016 . Iddo Bentov, Rafael Pass, and Elaine Shi. The Sleepy Model of Consensus. IACR Cryptology ePrint Archive, 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution. 27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution. 27th {USENIX} Security Symposium ({USENIX} Security 18) , 2018 . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution. 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers","author":"Cachin Christian","year":"2016","unstructured":"Christian Cachin . Architecture of the Hyperledger blockchain fabric . Workshop on Distributed Cryptocurrencies and Consensus Ledgers , 2016 . Christian Cachin. Architecture of the Hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_10_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . Intel SGX Explained. IACR Cryptology ePrint Archive , 2016 :86, 2016. Victor Costan and Srinivas Devadas. Intel SGX Explained. IACR Cryptology ePrint Archive, 2016:86, 2016."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_1_12_1","first-page":"18","volume-title":"ICDT","author":"Dwork Cynthia","year":"2007","unstructured":"Cynthia Dwork . Ask a better question, get a better answer: A new approach to private data analysis . ICDT , pages 18 -- 27 , 2007 . Cynthia Dwork. Ask a better question, get a better answer: A new approach to private data analysis. ICDT, pages 18--27, 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of IEEE Open & Big Data Conference","author":"Ekblaw Ariel","year":"2016","unstructured":"Ariel Ekblaw , Asaph Azaria , John D. Halamka , and Andrew Lippman . A Case Study for Blockchain in Healthcare: \"MedRec\" prototype for electronic health records and medical research data . Proceedings of IEEE Open & Big Data Conference , 2016 . Ariel Ekblaw, Asaph Azaria, John D. Halamka, and Andrew Lippman. A Case Study for Blockchain in Healthcare: \"MedRec\" prototype for electronic health records and medical research data. Proceedings of IEEE Open & Big Data Conference, 2016."},{"key":"e_1_3_2_1_14_1","first-page":"175","volume-title":"Peter Druschel. PeerReview: Practical Accountability for Distributed Systems. Symposium on Operating Systems Principles","author":"Haeberlen Andreas","year":"2007","unstructured":"Andreas Haeberlen , Petr Kouznetsov , and Peter Druschel. PeerReview: Practical Accountability for Distributed Systems. Symposium on Operating Systems Principles , pages 175 -- 188 , Stevenson, Washington , October 2007 . Andreas Haeberlen, Petr Kouznetsov, and Peter Druschel. PeerReview: Practical Accountability for Distributed Systems. Symposium on Operating Systems Principles, pages 175--188, Stevenson, Washington, October 2007."},{"key":"e_1_3_2_1_15_1","first-page":"463","volume-title":"Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst.","author":"Maurice","year":"1990","unstructured":"Maurice P. Herlihy and Jeannette M . Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst. , pages 463 -- 492 , 1990 . Maurice P. Herlihy and Jeannette M. Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst., pages 463--492, 1990."},{"key":"e_1_3_2_1_16_1","first-page":"533","volume-title":"Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. Symposium on Operating System Design and Implementation","author":"Hunt Tyler","year":"2016","unstructured":"Tyler Hunt , Zhiting Zhu , Yuanzhong Xu , Simon Peter , and Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. Symposium on Operating System Design and Implementation , pages 533 -- 549 , Savannah, Georgia , November 2016 . Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. Symposium on Operating System Design and Implementation, pages 533--549, Savannah, Georgia, November 2016."},{"key":"e_1_3_2_1_17_1","volume-title":"Jaehyuk Huh. ShieldStore: Shielded In-memory Key-value Storage with SGX. European Conference on Computer Systems","author":"Kim Taehoon","year":"2019","unstructured":"Taehoon Kim , Joongun Park , Jaewook Woo , Seungheun Jeon , and Jaehyuk Huh. ShieldStore: Shielded In-memory Key-value Storage with SGX. European Conference on Computer Systems , 2019 . Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. ShieldStore: Shielded In-memory Key-value Storage with SGX. European Conference on Computer Systems, 2019."},{"key":"e_1_3_2_1_18_1","volume-title":"Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution. 40th IEEE Symposium on Security and Privacy (S&P'19)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , and Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution. 40th IEEE Symposium on Security and Privacy (S&P'19) , 2019 . Paul Kocher, Jann Horn, Anders Fogh, and Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution. 40th IEEE Symposium on Security and Privacy (S&P'19), 2019."},{"key":"e_1_3_2_1_19_1","first-page":"45","volume-title":"ACM SIGOPS Operating Systems Review","author":"Kotla Ramakrishna","year":"2007","unstructured":"Ramakrishna Kotla , Lorenzo Alvisi , Mike Dahlin , Allen Clement , and Edmung Wong . Zyzzyva : Speculative byzantine fault tolerance . ACM SIGOPS Operating Systems Review , pages 45 -- 58 , 2007 . Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmung Wong. Zyzzyva: Speculative byzantine fault tolerance. ACM SIGOPS Operating Systems Review, pages 45--58, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"Christof Fetzer. PESOS: Policy Enhanced Secure Object Store. European Conference on Computer Systems","author":"Krahn Robert","year":"2018","unstructured":"Robert Krahn , Bohdan Trach , Anjo Vahldiek-Oberwagner , Thomas Knauth , Pramod Bhatotia , and Christof Fetzer. PESOS: Policy Enhanced Secure Object Store. European Conference on Computer Systems , 2018 . Robert Krahn, Bohdan Trach, Anjo Vahldiek-Oberwagner, Thomas Knauth, Pramod Bhatotia, and Christof Fetzer. PESOS: Policy Enhanced Secure Object Store. European Conference on Computer Systems, 2018."},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. Symposium on Networked System Design and Implementation","author":"Levin Dave","year":"2009","unstructured":"Dave Levin , John R. Douceur , Jacob R. Lorch , and Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. Symposium on Networked System Design and Implementation , pages 1 -- 14 , Boston, Massachusetts , April 2009 . Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. Symposium on Networked System Design and Implementation, pages 1--14, Boston, Massachusetts, April 2009."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_1_23_1","volume-title":"Symposium on Operating System Design and Implementation","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li , Maxwell N. Krohn , David Mazi\u00e8res , and Dennis Shashas . Secure Untrusted Data Repository (SUNDR) . Symposium on Operating System Design and Implementation , San Francisco, California , December 2004 . Jinyuan Li, Maxwell N. Krohn, David Mazi\u00e8res, and Dennis Shashas. Secure Untrusted Data Repository (SUNDR). Symposium on Operating System Design and Implementation, San Francisco, California, December 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Li and David Mazi\u00e8res. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. Symposium on Networked System Design and Implementation","author":"Jinyuan","year":"2007","unstructured":"Jinyuan Li and David Mazi\u00e8res. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. Symposium on Networked System Design and Implementation , Cambridge, Massachusetts , April 2007 . Jinyuan Li and David Mazi\u00e8res. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. Symposium on Networked System Design and Implementation, Cambridge, Massachusetts, April 2007."},{"key":"e_1_3_2_1_25_1","first-page":"321","volume-title":"Myers. Fabric: A Platform for Secure Distributed Computation and Storage. Symposium on Operating Systems Principles","author":"Liu Jed","year":"2009","unstructured":"Jed Liu , Michael D. George , K. Vikram , Xin Qi , Lucas Waye , and Andrew C . Myers. Fabric: A Platform for Secure Distributed Computation and Storage. Symposium on Operating Systems Principles , pages 321 -- 334 , Big Sky, Montana , October 2009 . Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers. Fabric: A Platform for Secure Distributed Computation and Storage. Symposium on Operating Systems Principles, pages 321--334, Big Sky, Montana, October 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"Symposium on Operating System Design and Implementation","author":"Maheshwari Umesh","year":"2000","unstructured":"Umesh Maheshwari , Radek Vingralek , and William Shapiro . How to build a trusted database system on untrusted storage . Symposium on Operating System Design and Implementation , San Diego, California , October 2000 . Umesh Maheshwari, Radek Vingralek, and William Shapiro. How to build a trusted database system on untrusted storage. Symposium on Operating System Design and Implementation, San Diego, California, October 2000."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/www.jpmorgan.com\/global\/Quorum","author":"Morgan JP","year":"2017","unstructured":"JP Morgan . Quorum. https:\/\/www.jpmorgan.com\/global\/Quorum , 2017 . JP Morgan. Quorum. https:\/\/www.jpmorgan.com\/global\/Quorum, 2017."},{"key":"e_1_3_2_1_29_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . Bitcoin: A peer-to-peer electronic cash system . 2008 . Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_3_2_1_31_1","volume-title":"EnclaveDB: A Secure Database using SGX. EnclaveDB: A Secure Database using SGX","author":"Priebe Christina","year":"2018","unstructured":"Christina Priebe , Kapil Vaswan , and Manuel Costa . EnclaveDB: A Secure Database using SGX. EnclaveDB: A Secure Database using SGX , 2018 . Christina Priebe, Kapil Vaswan, and Manuel Costa. EnclaveDB: A Secure Database using SGX. EnclaveDB: A Secure Database using SGX, 2018."},{"key":"e_1_3_2_1_32_1","volume-title":"Malware guard extension: Using SGX to conceal cache attacks. arXiv preprint arXiv:1702.08719","author":"Schwarz Michael","year":"2017","unstructured":"Michael Schwarz , Samuel Weiser , Daniel Gruss , Cl\u00e9mentine Maurice , and Stefan Mangard . Malware guard extension: Using SGX to conceal cache attacks. arXiv preprint arXiv:1702.08719 , 2017 . Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. Malware guard extension: Using SGX to conceal cache attacks. arXiv preprint arXiv:1702.08719, 2017."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_34_1","first-page":"13","volume-title":"European Conference on Computer Systems","author":"Vahldiek-Oberwagner Anjo","year":"2015","unstructured":"Anjo Vahldiek-Oberwagner , Eslam Elnikety , Aastha Mehta , Deepak Garg , Peter Druschel , Rodrigo Rodrigues , Johannes Gehrke , and Ansley Post . Guardat : Enforcing data policies at the storage layer . European Conference on Computer Systems , page 13 , 2015 . Anjo Vahldiek-Oberwagner, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Rodrigo Rodrigues, Johannes Gehrke, and Ansley Post. Guardat: Enforcing data policies at the storage layer. European Conference on Computer Systems, page 13, 2015."},{"key":"e_1_3_2_1_36_1","first-page":"151","article-title":"A secure decentralised generalised transaction ledger","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . Ethereum : A secure decentralised generalised transaction ledger . Ethereum Project Yellow Paper , 151 , 2014 . Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 2014.","journal-title":"Ethereum Project Yellow Paper"},{"issue":"3","key":"e_1_3_2_1_37_1","volume":"3","author":"Yumerefendi Aydan R.","year":"2007","unstructured":"Aydan R. Yumerefendi and Jeffrey S . Chase. Strong Accountability for Network Storage. Trans. Storage , 3 ( 3 ), 2007 . Aydan R. Yumerefendi and Jeffrey S. Chase. Strong Accountability for Network Storage. Trans. Storage, 3(3), 2007.","journal-title":"Chase. Strong Accountability for Network Storage. Trans. Storage"},{"key":"e_1_3_2_1_38_1","first-page":"283","volume-title":"Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. Symposium on Networked System Design and Implementation","author":"Zhang Wenting","year":"2017","unstructured":"Wenting Zhang , Dave Ankur , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. Symposium on Networked System Design and Implementation , pages 283 -- 298 , Boston, Massachusetts , March 2017 . Wenting Zhang, Dave Ankur, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. Symposium on Networked System Design and Implementation, pages 283--298, Boston, Massachusetts, March 2017."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","acronym":"SOSP '19","location":"Huntsville Ontario Canada"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":37,"alternative-id":["10.1145\/3342559.3365333","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365333","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}