{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:01:19Z","timestamp":1759384879407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003448","name":"General Secretariat for Research and Technology","doi-asserted-by":"publisher","award":["2767"],"award-info":[{"award-number":["2767"]}],"id":[{"id":"10.13039\/501100003448","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013209","name":"Hellenic Foundation for Research and Innovation","doi-asserted-by":"publisher","award":["2767"],"award-info":[{"award-number":["2767"]}],"id":[{"id":"10.13039\/501100013209","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Commission","award":["780787,833828,830927"],"award-info":[{"award-number":["780787,833828,830927"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375748","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["TrustAV"],"prefix":"10.1145","author":[{"given":"Dimitris","family":"Deyannis","sequence":"first","affiliation":[{"name":"FORTH-ICS &amp; University of Crete, Heraklion, Greece"}]},{"given":"Eva","family":"Papadogiannaki","sequence":"additional","affiliation":[{"name":"FORTH-ICS &amp; University of Crete, Heraklion, Greece"}]},{"given":"Giorgos","family":"Kalivianakis","sequence":"additional","affiliation":[{"name":"FORTH-ICS &amp; University of Crete, Heraklion, Greece"}]},{"given":"Giorgos","family":"Vasiliadis","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Heraklion, Greece"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. AVG AntiVirus for Android."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Avira: Download security privacy and speed-enhancing apps for Android and iOS. https:\/\/www.avira.com\/en\/mobile-security."},{"volume-title":"Cisco Visual Networking Index: Forecast and Trends","year":"2017","key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Cisco Visual Networking Index: Forecast and Trends, 2017- 2022. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visualnetworking- index-vni\/white-paper-c11--741490.html."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. ClamAV | Cisco Talos Intelligence Group. https:\/\/www.talosintelligence. com\/clamav."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Google Play Protect. https:\/\/www.android.com\/play-protect\/."},{"volume-title":"Monthly Threat Report (March","year":"2019","key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Monthly Threat Report (March 2019), Symantec. https:\/\/www.symantec. com\/security-center\/publications\/monthlythreatreport."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0226-7"},{"key":"e_1_3_2_1_9_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation.","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Daniel O'Keeffe, Mark L Stillwell, et al. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1213--1227.","author":"Biondo Andrea","key":"e_1_3_2_1_11_1","unstructured":"Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel {SGX}. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1213--1227."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"e_1_3_2_1_13_1","unstructured":"Sang Kil Cha Iulian Moraru Jiyong Jang John Truelove David Brumley and David G Andersen. 2010. SplitScreen: Enabling Efficient Distributed Malware Detection.. In NSDI. 377--390."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_21"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213344.3213347"},{"key":"e_1_3_2_1_17_1","volume-title":"EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 386--397","author":"Goltzsche David","year":"2018","unstructured":"David Goltzsche, Signe R\u00fcsch, Manuel Nieke, S\u00e9bastien Vaucher, Nico Weichbrodt, Valerio Schiavoni, Pierre-Louis Aublin, Paolo Cosa, Christof Fetzer, Pascal Felber, et al. 2018. EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 386--397."},{"key":"e_1_3_2_1_18_1","volume-title":"CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services. In International Workshop on Information and Operational Technology Security Systems. Springer, 122--133","author":"Hatzivasilis George","year":"2018","unstructured":"George Hatzivasilis, Konstantinos Fysarakis, Ioannis Askoxylakis, and Alexander Bilanakos. 2018. CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services. In International Workshop on Information and Operational Technology Security Systems. Springer, 122--133."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_2_1_20_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Lan Chang","year":"2016","unstructured":"Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, and Zhi Liu. 2016. Embark: securely outsourcing middleboxes to the cloud. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_2_1_22_1","volume-title":"Wouter Joosen, and Davide Balzarotti.","author":"Nikiforakis Nick","year":"2011","unstructured":"Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, and Davide Balzarotti. 2011. Exposing the Lack of Privacy in File Hosting Services.. In LEET."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 17th Conference on Security Symposium (SS'08)","author":"Oberheide Jon","year":"2008","unstructured":"Jon Oberheide, Evan Cooke, and Farnam Jahanian. 2008. CloudAV: N-version Antivirus in the Network Cloud. In Proceedings of the 17th Conference on Security Symposium (SS'08)."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium. 91--106","author":"Oberheide Jon","year":"2008","unstructured":"Jon Oberheide, Evan Cooke, and Farnam Jahanian. 2008. CloudAV: N-Version Antivirus in the Network Cloud.. In USENIX Security Symposium. 91--106."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_21"},{"key":"e_1_3_2_1_27_1","volume-title":"SafeBricks: Shielding Network Functions in the Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18)","author":"Poddar Rishabh","year":"2018","unstructured":"Rishabh Poddar, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. 2018. SafeBricks: Shielding Network Functions in the Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"volume-title":"EnclaveDB: A Secure Database using","author":"Priebe Christian","key":"e_1_3_2_1_29_1","unstructured":"Christian Priebe, Kapil Vaswani, and Manuel Costa. 2018. EnclaveDB: A Secure Database using SGX. In EnclaveDB: A Secure Database using SGX. IEEE, 0."},{"key":"e_1_3_2_1_30_1","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"Martin Roesch","year":"1999","unstructured":"Martin Roesch et al. 1999. Snort: Lightweight intrusion detection for networks.. In Lisa, Vol. 99. 229--238.","journal-title":"Lisa"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813720"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274823"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787502"},{"key":"e_1_3_2_1_36_1","volume-title":"Shruti Tople, and Prateek Saxena.","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007211"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3075572"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172869"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185469"},{"key":"e_1_3_2_1_42_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC).","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382227"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_5"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484340"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2924715.2924719"},{"key":"e_1_3_2_1_49_1","volume-title":"Joseph E Gonzalez, and Ion Stoica.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform.. In NSDI. 283--298."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375748"}},"subtitle":["Practical and Privacy Preserving Malware Analysis in the Cloud"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":48,"alternative-id":["10.1145\/3374664.3375748","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375748","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}