{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:24:21Z","timestamp":1773786261683,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1453020, 1738912"],"award-info":[{"award-number":["1453020, 1738912"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378486","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"971-985","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["COIN Attacks"],"prefix":"10.1145","author":[{"given":"Mustakimur Rahman","family":"Khandaker","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Baidu Security, Sunnyvale, CA, USA"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Tao","family":"Wei","sequence":"additional","affiliation":[{"name":"Baidu Security, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alberto Sonnino. 2019. SGX-wallet. https:\/\/github.com\/asonnino\/sgxwallet.  Alberto Sonnino. 2019. SGX-wallet. https:\/\/github.com\/asonnino\/sgxwallet."},{"key":"e_1_3_2_1_2_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX.. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 689--703.","author":"Arnautov Sergei","year":"2016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track","volume":"41","author":"Bellard Fabrice","year":"2005"},{"key":"e_1_3_2_1_5_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Biondo Andrea","year":"2018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353535.1346284"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_10_1","unstructured":"Eadom. 2018. Stack memory leak issue from SGX-mbetls project reported by an independent GitHub user. https:\/\/github.com\/bl4ck5un\/ mbedtls-SGX\/issues\/13.  Eadom. 2018. Stack memory leak issue from SGX-mbetls project reported by an independent GitHub user. https:\/\/github.com\/bl4ck5un\/ mbedtls-SGX\/issues\/13."},{"key":"e_1_3_2_1_11_1","unstructured":"Fan Zhang. 2019. SGX-mbedtls. https:\/\/github.com\/bl4ck5un\/mbedtls- SGX.  Fan Zhang. 2019. SGX-mbedtls. https:\/\/github.com\/bl4ck5un\/mbedtls- SGX."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"e_1_3_2_1_13_1","unstructured":"G. Beniamini. 2019. FuzzZone. https:\/\/github.com\/laginimaineb\/fuzz_ zone\/tree\/master\/FuzzZone.  G. Beniamini. 2019. FuzzZone. https:\/\/github.com\/laginimaineb\/fuzz_ zone\/tree\/master\/FuzzZone."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020)","author":"Harrison Lee","year":"2019"},{"key":"e_1_3_2_1_15_1","unstructured":"Intel. 2019. Intel SSL. https:\/\/github.com\/intel\/intel-sgx-ssl.  Intel. 2019. Intel SSL. https:\/\/github.com\/intel\/intel-sgx-ssl."},{"key":"e_1_3_2_1_16_1","unstructured":"Jim Gordon. 2018. Microsoft* Azure confidential computing with Intel\u00c2? SGX. https:\/\/intel.ly\/2Db5x1Z.  Jim Gordon. 2018. Microsoft* Azure confidential computing with Intel\u00c2? SGX. https:\/\/intel.ly\/2Db5x1Z."},{"key":"e_1_3_2_1_17_1","unstructured":"KAIST INA. 2019. SGX-Tor. https:\/\/github.com\/kaist-ina\/SGX-Tor.  KAIST INA. 2019. SGX-Tor. https:\/\/github.com\/kaist-ina\/SGX-Tor."},{"key":"e_1_3_2_1_18_1","volume-title":"12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).","author":"Koruyeh Esmaeil Mohammadian"},{"key":"e_1_3_2_1_19_1","unstructured":"Kudelski Security. 2019. SGX-Reencrypt. https:\/\/github.com\/ kudelskisecurity\/sgx-reencrypt.  Kudelski Security. 2019. SGX-Reencrypt. https:\/\/github.com\/ kudelskisecurity\/sgx-reencrypt."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_21_1","unstructured":"Large-Scale Data & Systems (LSDS) Group. 2019. TaLoS. https:\/\/github. com\/lsds\/TaLoS.  Large-Scale Data & Systems (LSDS) Group. 2019. TaLoS. https:\/\/github. com\/lsds\/TaLoS."},{"key":"e_1_3_2_1_22_1","unstructured":"Ledger. 2019. BoLoS. https:\/\/github.com\/LedgerHQ\/bolos-enclave.  Ledger. 2019. BoLoS. https:\/\/github.com\/LedgerHQ\/bolos-enclave."},{"key":"e_1_3_2_1_23_1","volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 523--539.","author":"Lee Jaehyuk"},{"key":"e_1_3_2_1_24_1","volume-title":"Leaking uninitialized secure enclave memory via structure padding. arXiv preprint arXiv:1710.09061","author":"Lee Sangho","year":"2017"},{"key":"e_1_3_2_1_25_1","volume-title":"Glamdring: Automatic Application Partitioning for Intel {SGX}. In 2017 {USENIX} Annual Technical Conference ({USENIX} {ATC} 17). 285--298.","author":"Lind Joshua","year":"2017"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_3_2_1_27_1","volume-title":"Innovative instructions and software model for isolated execution. Hasp@ isca 10, 1","author":"McKeen Frank","year":"2013"},{"key":"e_1_3_2_1_28_1","unstructured":"mitre. 2019. 2019 CWE Top 25 Most Dangerous Software Errors. https:\/\/cwe.mitre.org\/top25\/archive\/2019\/2019_cwe_top25.html.  mitre. 2019. 2019 CWE Top 25 Most Dangerous Software Errors. https:\/\/cwe.mitre.org\/top25\/archive\/2019\/2019_cwe_top25.html."},{"key":"e_1_3_2_1_29_1","unstructured":"Nelly Porter Jason Garms Sergey Simakov. 2018. Introducing Asylo: an open-source framework for confidential computing. https:\/\/bit.ly\/ 2YtVwof.  Nelly Porter Jason Garms Sergey Simakov. 2018. Introducing Asylo: an open-source framework for confidential computing. https:\/\/bit.ly\/ 2YtVwof."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00053"},{"key":"e_1_3_2_1_31_1","volume-title":"To appear in the Proceedings of the IEEE Symposium on Security & Privacy","author":"Priebe Christian","year":"2018"},{"key":"e_1_3_2_1_32_1","unstructured":"Ricardo de Souza Costa. 2019. SGXCryptoFile. https:\/\/github.com\/ rscosta\/SGXCryptoFile.  Ricardo de Souza Costa. 2019. SGXCryptoFile. https:\/\/github.com\/ rscosta\/SGXCryptoFile."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_9"},{"key":"e_1_3_2_1_34_1","unstructured":"Secure Systems Group (SSG) at Aalto University. 2019. SGX-migration. https:\/\/github.com\/SSGAalto\/sgx-migration.  Secure Systems Group (SSG) at Aalto University. 2019. SGX-migration. https:\/\/github.com\/SSGAalto\/sgx-migration."},{"key":"e_1_3_2_1_35_1","volume-title":"Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim.","author":"Seo Jaebaek","year":"2017"},{"key":"e_1_3_2_1_36_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker.. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12). 309--318.  Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker.. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12). 309--318."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_3_2_1_38_1","volume-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution.. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 991--1008.","author":"Bulck Jo Van","year":"2018"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_41_1","volume-title":"Interface- Based Side Channel Attack Against Intel SGX. arXiv preprint arXiv:1811.05378","author":"Wang Jinwen","year":"2018"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_43_1","unstructured":"Yerzhan Mazhkenov. 2019. SGX-SQLite. https:\/\/github.com\/yerzhan7\/ SGX_SQLite.  Yerzhan Mazhkenov. 2019. SGX-SQLite. https:\/\/github.com\/yerzhan7\/ SGX_SQLite."}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378486","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378486"}},"subtitle":["On Insecurity of Enclave Untrusted Interfaces in SGX"],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":43,"alternative-id":["10.1145\/3373376.3378486","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378486","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}