{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:30:25Z","timestamp":1769913025986,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangdong Provincial Science and Technology Plan Project","award":["2017B010124001"],"award-info":[{"award-number":["2017B010124001"]}]},{"name":"Office of Naval Research","award":["N00014-17-1-2893"],"award-info":[{"award-number":["N00014-17-1-2893"]}]},{"name":"National Key Research and Development Plan of China","award":["2017YFB0802205"],"award-info":[{"award-number":["2017YFB0802205"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1718997"],"award-info":[{"award-number":["1718997"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Fundamental Research Program","award":["JCYJ20170413114215614"],"award-info":[{"award-number":["JCYJ20170413114215614"]}]},{"name":"Guangdong Provincial Key R&D Plan Project","award":["2019B010139001"],"award-info":[{"award-number":["2019B010139001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378487","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"1263-1276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks"],"prefix":"10.1145","author":[{"given":"Pan","family":"Zhang","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology &amp; University of California, Riverside, Wuhan, China"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Heng","family":"Yin","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322265"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23513"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) .","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad , Kyungtae Kim , Muhammad Ihsanulhaq Sarfaraz , and Byoungyoung Lee . 2018 . OBLIVIATE: A Data Oblivious File System for Intel SGX . In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) . Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious File System for Intel SGX. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) ."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. 2014. ARM TrustZone . https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone  ARM. 2014. ARM TrustZone . https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone"},{"key":"e_1_3_2_1_5_1","unstructured":"ARMmbed. 2019. Mbed TLS. https:\/\/tls.mbed.org\/  ARMmbed. 2019. Mbed TLS. https:\/\/tls.mbed.org\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) .","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andr\u00e9 Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark Stillwell , David Goltzsche , David M. Eyers , R\u00fc diger Kapitza , Peter R. Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX .. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andr\u00e9 Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Stillwell, David Goltzsche, David M. Eyers, R\u00fc diger Kapitza, Peter R. Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX.. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_8_1","volume-title":"Urs M\u00fc ller, and Ahmad-Reza Sadeghi","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Srdjan Capkun , Alexandra Dmitrienko , Tommaso Frassetto , Kari Kostiainen , Urs M\u00fc ller, and Ahmad-Reza Sadeghi . 2017 a. DR.SGX : Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR , Vol. abs\/ 1709 .09917 (2017). arxiv: 1709.09917 Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs M\u00fc ller, and Ahmad-Reza Sadeghi. 2017a. DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR , Vol. abs\/1709.09917 (2017). arxiv: 1709.09917"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) .","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 b. Software grand exposure: SGX cache attacks are practical . In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017b. Software grand exposure: SGX cache attacks are practical. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) ."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proceedings of the USENIX Security Symposium (Security) . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fc diger Kapitza , Frank Piessens , and Raoul Strackx . 2017 b. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In Proceedings of the USENIX Security Symposium (Security) . Jo Van Bulck, Nico Weichbrodt, R\u00fc diger Kapitza, Frank Piessens, and Raoul Strackx. 2017b. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_13_1","unstructured":"BYTE Magazine. 201"},{"key":"e_1_3_2_1_14_1","volume-title":"SGXPECTRE Attacks: Leaking Enclave Secrets via Speculative Execution. arXiv preprint arXiv:1802.09085","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten-Hwang Lai . 2018. SGXPECTRE Attacks: Leaking Enclave Secrets via Speculative Execution. arXiv preprint arXiv:1802.09085 ( 2018 ). Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten-Hwang Lai. 2018. SGXPECTRE Attacks: Leaking Enclave Secrets via Speculative Execution. arXiv preprint arXiv:1802.09085 (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) .","author":"Chen Xiaoxin","unstructured":"Xiaoxin Chen , Tal Garfinkel , E. Christopher Lewis , Pratap Subrahmanyam , Carl A. Waldspurger , Dan Boneh , Jeffrey S. Dwoskin , and Dan R. K. Ports . 2008. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems . In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) . Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, and Dan R. K. Ports. 2008. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) ."},{"key":"e_1_3_2_1_17_1","unstructured":"Peter J. Denning. 196"},{"key":"e_1_3_2_1_18_1","volume-title":"Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM)","author":"Goldreich Oded","year":"1996","unstructured":"Oded Goldreich and Rafail Ostrovsky . 1996. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) ( 1996 ). Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) (1996)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Gras Ben","year":"2018","unstructured":"Ben Gras , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2018 . Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks . In Proceedings of the USENIX Security Symposium (Security) . Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_21_1","volume-title":"Intel trusted execution technology. Intel Technology White Paper","author":"Greene James","year":"2012","unstructured":"James Greene . 2012. Intel trusted execution technology. Intel Technology White Paper ( 2012 ). James Greene. 2012. Intel trusted execution technology. Intel Technology White Paper (2012)."},{"key":"e_1_3_2_1_22_1","volume-title":"A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive","author":"Gueron Shay","year":"2016","unstructured":"Shay Gueron . 2016. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive ( 2016 ). Shay Gueron. 2016. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC) .","author":"Marcus","year":"2017","unstructured":"Marcus H\"ahnel, Weidong Cui , and Marcus Peinado . 2017 . High-Resolution Side Channels for Untrusted Operating Systems . In Proceedings of the USENIX Annual Technical Conference (ATC) . Marcus H\"ahnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In Proceedings of the USENIX Annual Technical Conference (ATC) ."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_25_1","unstructured":"IJG. 2019. libjpeg. http:\/\/libjpeg.sourceforge.net\/  IJG. 2019. libjpeg. http:\/\/libjpeg.sourceforge.net\/"},{"key":"e_1_3_2_1_26_1","volume-title":"ISCA","year":"2015","unstructured":"Intel. 2015 . SGX Tutorial , ISCA 2015. http:\/\/sgxisca.weebly.com\/. Intel. 2015. SGX Tutorial, ISCA 2015. http:\/\/sgxisca.weebly.com\/."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. 2019 a. Intel(R) Software Guard Extensions for Linux* OS linux-sgx-driver . https:\/\/github.com\/01org\/linux-sgx-driver  Intel. 2019 a. Intel(R) Software Guard Extensions for Linux* OS linux-sgx-driver . https:\/\/github.com\/01org\/linux-sgx-driver"},{"key":"e_1_3_2_1_28_1","unstructured":"Intel. 2019 b. Intel(R) Software Guard Extensions for Linux* OS SDK . https:\/\/github.com\/01org\/linux-sgx  Intel. 2019 b. Intel(R) Software Guard Extensions for Linux* OS SDK . https:\/\/github.com\/01org\/linux-sgx"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) .","author":"Kim Seongmin","year":"2017","unstructured":"Seongmin Kim , Juhyeng Han , Jaehyeong Ha , Taesoo Kim , and Dongsu Han . 2017 . Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) . Seongmin Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, and Dongsu Han. 2017. Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) ."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing . In Proceedings of the USENIX Security Symposium (Security) . Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_31_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. arXiv preprint arXiv:1801.01207 ( 2018 ). Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv:1801.01207 (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_33_1","volume-title":"Savagaonkar","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R . Savagaonkar . 2013 . Innovative instructions and software model for isolated execution. In Proceedings of the Hardware and Architectural Support for Security and Privacy (HASP) . Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In Proceedings of the Hardware and Architectural Support for Security and Privacy (HASP) ."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Ahmad Moghimi Gorka Irazoqui and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In Cryptographic Hardware and Embedded Systems .  Ahmad Moghimi Gorka Irazoqui and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In Cryptographic Hardware and Embedded Systems .","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9 dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors . In Proceedings of the USENIX Security Symposium (Security) . Olga Ohrimenko, Felix Schuster, C\u00e9 dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution . In Proceedings of the USENIX Security Symposium (Security) . Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the USENIX Security Symposium (Security) .","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher W. Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten van Dijk , and Srinivas Devadas . 2015 . Constants Count: Practical Improvements to Oblivious RAM . In Proceedings of the USENIX Security Symposium (Security) . Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In Proceedings of the USENIX Security Symposium (Security) ."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) .","author":"Sasy Sajin","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W. Fletcher . 2017. ZeroTrace : Oblivious Memory Primitives from Intel SGX . In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) . Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2017. ZeroTrace : Oblivious Memory Primitives from Intel SGX. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS) ."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE) .","author":"Sinha Rohit","unstructured":"Rohit Sinha , Sriram Rajamani , and Sanjit A. Seshia . 2017. A Compiler and Verifier for Page Access Oblivious Computation . In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE) . Rohit Sinha, Sriram Rajamani, and Sanjit A. Seshia. 2017. A Compiler and Verifier for Page Access Oblivious Computation. In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE) ."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the ACM\/IEEE International Symposium on Computer Architecture (ISCA) .","author":"Skarlatos Dimitrios","unstructured":"Dimitrios Skarlatos , Mengjia Yan , Bhargava Gopireddy , Read Sprabery , Josep Torrellas , and Christopher W. Fletcher . 2019. MicroScope: enabling microarchitectural replay attacks . In Proceedings of the ACM\/IEEE International Symposium on Computer Architecture (ISCA) . Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, and Christopher W. Fletcher. 2019. MicroScope: enabling microarchitectural replay attacks. In Proceedings of the ACM\/IEEE International Symposium on Computer Architecture (ISCA) ."},{"key":"e_1_3_2_1_49_1","volume-title":"Towards practical oblivious RAM. arXiv preprint arXiv:1106.3652","author":"Stefanov Emil","year":"2011","unstructured":"Emil Stefanov , Elaine Shi , and Dawn Song . 2011. Towards practical oblivious RAM. arXiv preprint arXiv:1106.3652 ( 2011 ). Emil Stefanov, Elaine Shi, and Dawn Song. 2011. Towards practical oblivious RAM. arXiv preprint arXiv:1106.3652 (2011)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC) .","author":"Porter Donald E.","year":"2017","unstructured":"Chia-che Tsai, Donald E. Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX . In Proceedings of the USENIX Annual Technical Conference (ATC) . Chia-che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the USENIX Annual Technical Conference (ATC) ."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS) .","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Frank Piessens , and Raoul Strackx . 2018 . Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic . In Proceedings of the ACM Conference on Computer and Communications Security (CCS) . Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2018. Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) ."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3373376.3378487","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378487","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":56,"alternative-id":["10.1145\/3373376.3378487","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378487","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}