{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T23:03:03Z","timestamp":1762210983185,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375726","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"5-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["ProximiTEE"],"prefix":"10.1145","author":[{"given":"Aritra","family":"Dhar","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Ivan","family":"Puddu","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Kari","family":"Kostiainen","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Tiny Core Linux Micro Core Linux 12MB Linux GUI Desktop Live Frugal Extendable. https:\/\/distro.ibiblio.org\/tinycorelinux\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Sachin Agarwal. 2018. Public Cloud Inter-region Network Latency as Heat-maps. http:\/\/tiny.cc\/vvbvbz"},{"key":"e_1_3_2_1_3_1","volume-title":"OBFSCURO: A Commodity Obfuscation Engine on Intel SGX. NDSS'19","author":"A. Ahmad","year":"2019","unstructured":"A. Ahmad et al. 2019. OBFSCURO: A Commodity Obfuscation Engine on Intel SGX. NDSS'19."},{"key":"e_1_3_2_1_4_1","volume-title":"Algo-Logic Systems","author":"Inc.","year":"2019","unstructured":"Inc. Algo-Logic Systems. 2019. Low Latency PCIe Solutions for FPGA. https:\/\/www.algo-logic.com\/sites\/default\/files\/PCIe.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"Distance-Bounding Protocols. In EUROCRYPT '93","author":"Brands Stefan","year":"1993","unstructured":"Stefan Brands and David Chaum. 1993. Distance-Bounding Protocols. In EUROCRYPT '93."},{"key":"e_1_3_2_1_6_1","unstructured":"V. Costan and S. Devadas. 2016. Intel SGX Explained. Cryptology ePrint Archive Report 2016\/086."},{"key":"e_1_3_2_1_7_1","volume-title":"TCHES 2018","author":"Fergus","year":"2018","unstructured":"Fergus Dall et al. 2018. Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks. TCHES 2018, 2 (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"Ferdinand Brasser et al. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX WOOT'17."},{"key":"e_1_3_2_1_9_1","volume-title":"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security'18.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck et al. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security'18."},{"key":"e_1_3_2_1_10_1","volume-title":"Fink et al","author":"Russell","year":"2011","unstructured":"Russell A. Fink et al. 2011. Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel. In Trust and Trustworthy Computing."},{"volume-title":"CHES'01","author":"Karine","key":"e_1_3_2_1_11_1","unstructured":"Karine Gandolfi et al. 2001. Electromagnetic analysis: Concrete results. In CHES'01."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Daniel Genkin et al. 2016. Physical key extraction attacks on PCs. Commun. ACM 59 6 (2016).","DOI":"10.1145\/2851486"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Johannes G\u00f6tzfried et al. 2017. Cache attacks on Intel SGX. In EuroSec'17.","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_14_1","unstructured":"Simon Johnson and Intel. 2017. Intel SGX: EPID Provisioning and Attestation Services. http:\/\/tiny.cc\/6nbvbz."},{"key":"e_1_3_2_1_15_1","volume-title":"Kocher","author":"Paul","year":"2019","unstructured":"Paul et al. Kocher. 2019. Spectre Attacks: Exploiting Speculative Execution. In S&P'19."},{"key":"e_1_3_2_1_16_1","volume-title":"Lee","author":"Sangho","year":"2017","unstructured":"Sangho et al. Lee. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In USENIX Security'17."},{"key":"e_1_3_2_1_17_1","unstructured":"ARM Limited. [n. d.]. SSL Library mbed TLS \/ PolarSSL. https:\/\/tls.mbed.org\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Meltdown: Reading Kernel Memory from User Space. USENIX Security'18.","author":"Moritz Lipp","year":"2018","unstructured":"Moritz Lipp et al. 2018. Meltdown: Reading Kernel Memory from User Space. USENIX Security'18."},{"volume-title":"Myrinet and Quadrics. In SC'03","author":"Jiuxing","key":"e_1_3_2_1_19_1","unstructured":"Jiuxing Liu et al. and Chandrasekaran. 2003. Performance comparison of MPI implementations over InfiniBand, Myrinet and Quadrics. In SC'03."},{"key":"e_1_3_2_1_20_1","volume-title":"ROTE: Rollback Protection for Trusted Execution.. In USENIX Security'17.","author":"Sinisa Matetic ET","year":"2017","unstructured":"Sinisa Matetic ET AL. 2017. ROTE: Rollback Protection for Trusted Execution.. In USENIX Security'17."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_23_1","unstructured":"Bryan Parno. 2008. Bootstrapping Trust in a Trusted Platform. In HotSec'08."},{"key":"e_1_3_2_1_24_1","volume-title":"Raccoon: Closing Digital Side-Channels through Obfuscated Execution.. In USENIX Security'15.","author":"Ashay Rane","year":"2015","unstructured":"Ashay Rane et al. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution.. In USENIX Security'15."},{"volume-title":"NDSS'17","author":"Sajin","key":"e_1_3_2_1_25_1","unstructured":"Sajin Sasy et al. 2017. ZeroTrace: Oblivious memory primitives from Intel SGX. In NDSS'17."},{"key":"e_1_3_2_1_26_1","unstructured":"Vinnie Scarlata et al. 2018. Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives. http:\/\/tiny.cc\/oxbvbz."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Felix Schuster et al. 2015. VC3: Trustworthy data analytics in the cloud using SGX. In S&P'15.","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz et al. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. arXiv:1905.05726 (2019).","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_29_1","volume-title":"Acoustic cryptanalysis. presentation available from http:\/\/www. wisdom. weizmann. ac. il\/ tromer","author":"Shamir Adi","year":"2004","unstructured":"Adi Shamir and Eran Tromer. 2004. Acoustic cryptanalysis. presentation available from http:\/\/www. wisdom. weizmann. ac. il\/ tromer (2004)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"volume-title":"Perspectives: Improving SSH-style Host Authentication with Multi-path Probing. In USENIX ATC'08","author":"Dan","key":"e_1_3_2_1_31_1","unstructured":"Dan Wendlandt et al. 2008. Perspectives: Improving SSH-style Host Authentication with Multi-path Probing. In USENIX ATC'08."},{"key":"e_1_3_2_1_32_1","volume-title":"Xu","author":"Yuanzhong","year":"2015","unstructured":"Yuanzhong et al. Xu. 2015. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In S&P'15."},{"volume-title":"Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. In CCS'17","author":"Zhangkai","key":"e_1_3_2_1_33_1","unstructured":"Zhangkai Zhang et al. 2017. Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. In CCS'17."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375726"}},"subtitle":["Hardened SGX Attestation by Proximity Verification"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":33,"alternative-id":["10.1145\/3374664.3375726","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375726","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}