{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T22:16:33Z","timestamp":1768083393826,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF OAC-1738929"],"award-info":[{"award-number":["NSF OAC-1738929"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359845","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"390-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SecDATAVIEW"],"prefix":"10.1145","author":[{"given":"Saeid","family":"Mofrad","sequence":"first","affiliation":[{"name":"Wayne State University"}]},{"given":"Ishtiaq","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Wayne State University"}]},{"given":"Shiyong","family":"Lu","sequence":"additional","affiliation":[{"name":"Wayne State University"}]},{"given":"Ping","family":"Yang","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton"}]},{"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wayne State University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. National institute of standards national vulnerability database. https:\/\/nvd.nist.gov\/.  [n.d.]. National institute of standards national vulnerability database. https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Secunia Advisory. 2013. Xen pv kernel decompression multiple vulnerabilities.  Secunia Advisory. 2013. Xen pv kernel decompression multiple vulnerabilities."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2018.00018"},{"key":"e_1_3_2_1_4_1","unstructured":"AMD. 2018. Secure Encrypted Virtualization API Version 0.16. https:\/\/support.amd.com\/en-us\/search\/tech-docs.  AMD. 2018. Secure Encrypted Virtualization API Version 0.16. https:\/\/support.amd.com\/en-us\/search\/tech-docs."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative technology for CPU based attestation and sealing . In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy , Vol. 13 . Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. 13."},{"key":"e_1_3_2_1_6_1","first-page":"689","article-title":"SCONE: Secure Linux Containers with Intel SGX","volume":"16","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'keeffe , and Mark L Stillwell . 2016 . SCONE: Secure Linux Containers with Intel SGX . In OSDI , Vol. 16. 689 -- 703 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'keeffe, and Mark L Stillwell. 2016. SCONE: Secure Linux Containers with Intel SGX. In OSDI, Vol. 16. 689--703.","journal-title":"OSDI"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Symposium on Security and Privacy (SP)","author":"Baumann Andrew","year":"2015","unstructured":"Andrew Baumann , Marcus Peinado , and Galen Hunt . 2015 . VC3: Trustworthy data analytics in the cloud using SGX . In IEEE Symposium on Security and Privacy (SP) , 2015. IEEE, 38--54. Andrew Baumann, Marcus Peinado, and Galen Hunt. 2015. VC3: Trustworthy data analytics in the cloud using SGX. In IEEE Symposium on Security and Privacy (SP), 2015. IEEE, 38--54."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258388"},{"key":"e_1_3_2_1_11_1","unstructured":"inc Black Duck Software. [n.d.]. Black Duck Open Hub. https:\/\/www.openhub.net\/p?query=xen&sort=relevance.  inc Black Duck Software. [n.d.]. Black Duck Open Hub. https:\/\/www.openhub.net\/p?query=xen&sort=relevance."},{"key":"e_1_3_2_1_12_1","volume-title":"Software grand exposure: SGX cache attacks are practical. arXiv preprint arXiv:1702.07521","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017. Software grand exposure: SGX cache attacks are practical. arXiv preprint arXiv:1702.07521 ( 2017 ), 33. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv preprint arXiv:1702.07521 (2017), 33."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Stefan Brenner Colin Wulf David Goltzsche Nico Weichbrodt Matthias Lorenz Christof Fetzer Peter Pietzuch and R\u00fcdiger Kapitza. 2016. SecureKeeper: Confidential ZooKeeper using Intel SGX. In Middleware. 14.  Stefan Brenner Colin Wulf David Goltzsche Nico Weichbrodt Matthias Lorenz Christof Fetzer Peter Pietzuch and R\u00fcdiger Kapitza. 2016. SecureKeeper: Confidential ZooKeeper using Intel SGX. In Middleware. 14.","DOI":"10.1145\/2988336.2988350"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046753"},{"key":"e_1_3_2_1_15_1","unstructured":"Jon Crowcroft. 2018. Description of SGX-LKL by Peter Pietzuch - Imperial College London. https:\/\/www.cl.cam.ac.uk\/~jac22\/talks\/ox-strachey-6.3.2018.pptx.  Jon Crowcroft. 2018. Description of SGX-LKL by Peter Pietzuch - Imperial College London. https:\/\/www.cl.cam.ac.uk\/~jac22\/talks\/ox-strachey-6.3.2018.pptx."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security Symposium. 447--462","author":"Anh Dinh Tien Tuan","year":"2015","unstructured":"Tien Tuan Anh Dinh , Prateek Saxena , Ee-Chien Chang , Beng Chin Ooi , and Chunwang Zhang . 2015 . M2R: Enabling Stronger Privacy in MapReduce Computation .. In USENIX Security Symposium. 447--462 . Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, and Chunwang Zhang. 2015. M2R: Enabling Stronger Privacy in MapReduce Computation.. In USENIX Security Symposium. 447--462."},{"key":"e_1_3_2_1_18_1","unstructured":"Paul D'Avilar Jeremy D'Errico Ken Berends and Michael Peck. 2004. Reading Guide 3: Authenticated Encryption. (2004).  Paul D'Avilar Jeremy D'Errico Ken Berends and Michael Peck. 2004. Reading Guide 3: Authenticated Encryption. (2004)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.58"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1785\/0120100057"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '17). USENIX Association","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . 2017 . High-resolution Side Channels for Untrusted Operating Systems . In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '17). USENIX Association , Berkeley, CA, USA, 299--312. http:\/\/dl.acm.org\/citation.cfm?id=3154690.3154719 Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-resolution Side Channels for Untrusted Operating Systems. In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '17). USENIX Association, Berkeley, CA, USA, 299--312. http:\/\/dl.acm.org\/citation.cfm?id=3154690.3154719"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2014.74"},{"key":"e_1_3_2_1_23_1","volume-title":"Traveling light, the Lua way","author":"Hirschi Ashwin","year":"2007","unstructured":"Ashwin Hirschi . 2007. Traveling light, the Lua way . IEEE software 24, 5 ( 2007 ). Ashwin Hirschi. 2007. Traveling light, the Lua way. IEEE software 24, 5 (2007)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Matthew Hoekstra Reshma Lal Pradeep Pappachan Vinay Phegade and Juan Del Cuvillo. 2013. Using innovative instructions to create trustworthy software solutions.. In HASP@ ISCA. 11.  Matthew Hoekstra Reshma Lal Pradeep Pappachan Vinay Phegade and Juan Del Cuvillo. 2013. Using innovative instructions to create trustworthy software solutions.. In HASP@ ISCA. 11.","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_25_1","unstructured":"Intel. 2018. Intel Software Guard Extensions SDK (EDL). https:\/\/software.intel.com\/en-us\/sgx-sdk-dev-reference.  Intel. 2018. Intel Software Guard Extensions SDK (EDL). https:\/\/software.intel.com\/en-us\/sgx-sdk-dev-reference."},{"key":"e_1_3_2_1_26_1","unstructured":"Intel. 2019. Intel Software Guard Extensions SDK (ECALL-OCALL Functions). https:\/\/software.intel.com\/en-us\/node\/702973.  Intel. 2019. Intel Software Guard Extensions SDK (ECALL-OCALL Functions). https:\/\/software.intel.com\/en-us\/node\/702973."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_28_1","volume-title":"AMD x86 Memory Encryption Technologies","author":"Kaplan David","unstructured":"David Kaplan . 2016. AMD x86 Memory Encryption Technologies . USENIX Association , Austin, TX . David Kaplan. 2016. AMD x86 Memory Encryption Technologies. USENIX Association, Austin, TX."},{"key":"e_1_3_2_1_29_1","volume-title":"Apr","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper , Apr ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper, Apr (2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.16"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.16"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.29268\/stbd.2017.4.1.1"},{"key":"e_1_3_2_1_34_1","volume-title":"Cloudburst: A VMware guest to host escape story. Black Hat USA","author":"Kortchinsky Kostya","year":"2009","unstructured":"Kostya Kortchinsky . 2009 . Cloudburst: A VMware guest to host escape story. Black Hat USA (2009), 19. Kostya Kortchinsky. 2009. Cloudburst: A VMware guest to host escape story. Black Hat USA (2009), 19."},{"key":"e_1_3_2_1_35_1","volume-title":"26th USENIX Security Symposium, USENIX Security. 16--18","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In 26th USENIX Security Symposium, USENIX Security. 16--18 . Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In 26th USENIX Security Symposium, USENIX Security. 16--18."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.4"},{"key":"e_1_3_2_1_37_1","volume-title":"The design of cloud workflow systems","author":"Liu Xiao","unstructured":"Xiao Liu , Dong Yuan , Gaofeng Zhang , Wenhao Li , Dahai Cao , Qiang He , Jinjun Chen , and Yun Yang . 2011. The design of cloud workflow systems . Springer Science & Business Media . Xiao Liu, Dong Yuan, Gaofeng Zhang, Wenhao Li, Dahai Cao, Qiang He, Jinjun Chen, and Yun Yang. 2011. The design of cloud workflow systems. Springer Science & Business Media."},{"key":"e_1_3_2_1_38_1","unstructured":"LSDS. 2018. SGX-LKL Remote Attestation. https:\/\/github.com\/lsds\/sgx-lkl\/wiki\/Remote-Attestation-and-Remote-Control.  LSDS. 2018. SGX-LKL Remote Attestation. https:\/\/github.com\/lsds\/sgx-lkl\/wiki\/Remote-Attestation-and-Remote-Control."},{"key":"e_1_3_2_1_39_1","unstructured":"LSDS. 2019. The Allan Turing Institute SGX-LKL Library. https:\/\/www.turing.ac.uk\/research\/publications\/sgx-lkl-library-os-running-java-applications-intel-sgx-enclaves.  LSDS. 2019. The Allan Turing Institute SGX-LKL Library. https:\/\/www.turing.ac.uk\/research\/publications\/sgx-lkl-library-os-running-java-applications-intel-sgx-enclaves."},{"key":"e_1_3_2_1_40_1","unstructured":"LSDS. 2019. LSDS SGX-LKL Library. https:\/\/github.com\/lsds\/sgx-lkl.  LSDS. 2019. LSDS SGX-LKL Library. https:\/\/github.com\/lsds\/sgx-lkl."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.150"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution.. In HASP@ISCA. 10.  Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution.. In HASP@ISCA. 10.","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.129"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988346"},{"key":"e_1_3_2_1_48_1","volume-title":"Designing Privacy Enhancing Technologies","author":"Raymond Jean-Fran\u00e7ois","unstructured":"Jean-Fran\u00e7ois Raymond . 2001. Traffic analysis: Protocols, attacks, design issues, and open problems . In Designing Privacy Enhancing Technologies . Springer , 10--29. Jean-Fran\u00e7ois Raymond. 2001. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies. Springer, 10--29."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_52_1","unstructured":"Bruce Schneier. 2007. Applied cryptography: protocols algorithms and source code in C. john wiley & sons.  Bruce Schneier. 2007. Applied cryptography: protocols algorithms and source code in C. john wiley & sons."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_54_1","unstructured":"Cloud Research Security. 2018. SGX-LKL SCONE Graphene-SGX-Remote Attestation status. https:\/\/github.com\/lsds\/sgx-lkl\/issues\/13.  Cloud Research Security. 2018. SGX-LKL SCONE Graphene-SGX-Remote Attestation status. https:\/\/github.com\/lsds\/sgx-lkl\/issues\/13."},{"key":"e_1_3_2_1_55_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC).","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E Porter , and Mona Vij . 2017 . Graphene-SGX: A practical library OS for unmodified applications on SGX . In 2017 USENIX Annual Technical Conference (USENIX ATC). Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_57_1","volume-title":"Xen 0wning trilogy. Invisible Things Lab","author":"Wojtczuk Rafal","year":"2008","unstructured":"Rafal Wojtczuk , Joanna Rutkowska , and Alexander Tereshkin . 2008. Xen 0wning trilogy. Invisible Things Lab ( 2008 ). Rafal Wojtczuk, Joanna Rutkowska, and Alexander Tereshkin. 2008. Xen 0wning trilogy. Invisible Things Lab (2008)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.13"},{"key":"e_1_3_2_1_61_1","volume-title":"Joseph E Gonzalez, and Ion Stoica.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez, and Ion Stoica. 2017 . Opaque : An Oblivious and Encrypted Distributed Analytics Platform.. In NSDI. 283--298. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform.. In NSDI. 283--298."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359845","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359845"}},"subtitle":["a secure big data workflow management system for heterogeneous computing environments"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":61,"alternative-id":["10.1145\/3359789.3359845","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359845","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}