{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:47:19Z","timestamp":1756896439307,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1917627"],"award-info":[{"award-number":["CNS-1917627"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375749","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"17-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["MOSE"],"prefix":"10.1145","author":[{"given":"Thang","family":"Hoang","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Rouzbeh","family":"Behnia","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Attila A.","family":"Yavuz","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious File System for Intel SGX. (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_8"},{"key":"e_1_3_2_1_3_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 209--223","author":"Asonov Dmitri","year":"2002","unstructured":"Dmitri Asonov and Johann-Christoph Freytag. 2002. Almost optimal private information retrieval. In International Workshop on Privacy Enhancing Technologies. Springer, 209--223."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_34"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70503-3_3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_8"},{"key":"e_1_3_2_1_10_1","volume-title":"Sgxpectre attacks: Stealing intel secrets from sgx enclaves via speculative execution. arXiv preprint arXiv:1802.09085","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H Lai. 2018. Sgxpectre attacks: Stealing intel secrets from sgx enclaves via speculative execution. arXiv preprint arXiv:1802.09085 (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00049"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103007"},{"key":"e_1_3_2_1_21_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Marcus","year":"2017","unstructured":"Marcus H\"ahnel, Weidong Cui, and Marcus Peinado. 2017. High-resolution side channels for untrusted operating systems. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA . 299--312."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134090"},{"key":"e_1_3_2_1_23_1","volume-title":"Yeongjin Jang, and Attila A Yavuz.","author":"Hoang Thang","year":"2019","unstructured":"Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, and Attila A Yavuz. 2019. Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. Proceedings on Privacy Enhancing Technologies , Vol. 2019, 1 (2019), 172--191."},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Corporation. 2013. Intel Software Guard Extensions Programming Reference (rev1) . 329298-001US."},{"key":"e_1_3_2_1_25_1","unstructured":"Intel Corporation. 2014. Intel Software Guard Extensions Programming Reference (rev2) . 329298-002US."},{"key":"e_1_3_2_1_26_1","volume-title":"26th USENIX Security Symposium, USENIX Security. 16--18","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In 26th USENIX Security Symposium, USENIX Security. 16--18."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.021"},{"key":"e_1_3_2_1_28_1","volume-title":"FAST","volume":"2013","author":"Lorch Jacob R","year":"2013","unstructured":"Jacob R Lorch, Bryan Parno, James W Mickens, Mariana Raykova, and Joshua Schiffman. 2013. Shroud: ensuring private access to large-scale data in the data center.. In FAST , Vol. 2013. 199--213."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.28"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_32"},{"key":"e_1_3_2_1_32_1","volume-title":"11th USENIX Workshop on Offensive Technologies,$$WOOT$$ 2017","author":"M\u00fcller Urs","year":"2017","unstructured":"Urs M\u00fcller. 2017. Software Grand Exposure:$$SGX$$ Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies,$$WOOT$$ 2017, Vancouver, BC, Canada, August 14--15, 2017. USENIX."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23349"},{"key":"e_1_3_2_1_35_1","first-page":"1141","article-title":"An Oblivious Parallel RAM with O (log2 N) Parallel Runtime Blowup","volume":"2016","author":"Nayak Kartik","year":"2016","unstructured":"Kartik Nayak and Jonathan Katz. 2016. An Oblivious Parallel RAM with O (log2 N) Parallel Runtime Blowup. IACR Cryptology ePrint Archive , Vol. 2016 (2016), 1141.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security Symposium . 619--636","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors.. In USENIX Security Symposium . 619--636."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium. 431--446","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution.. In USENIX Security Symposium. 431--446."},{"key":"e_1_3_2_1_38_1","first-page":"997","article-title":"Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM","volume":"2014","author":"Ren Ling","year":"2014","unstructured":"Ling Ren, Christopher W Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2014. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptology ePrint Archive , Vol. 2014 (2014), 997.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485971"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.20"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_3_2_1_42_1","volume-title":"Emil Stefanov, and Mingfei Li.","author":"Shi Elaine","year":"2011","unstructured":"Elaine Shi, T-H Hubert Chan, Emil Stefanov, and Mingfei Li. 2011. Oblivious RAM with O ((logN) 3) worst-case cost. In Advances in Cryptology--ASIACRYPT 2011. Springer, 197--214."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0683"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516673"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.25"},{"key":"e_1_3_2_1_46_1","volume-title":"Towards practical oblivious RAM. arXiv preprint arXiv:1106.3652","author":"Stefanov Emil","year":"2011","unstructured":"Emil Stefanov, Elaine Shi, and Dawn Song. 2011. Towards practical oblivious RAM. arXiv preprint arXiv:1106.3652 (2011)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In Proceedings of the 26th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_50_1","volume-title":"RIDL: Rogue In-flight Data Load. In S&P.","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-flight Data Load. In S&P."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"e_1_3_2_1_53_1","volume-title":"Marina Minkin, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Raoul Strackx, Thomas F. Wenisch, and Yuval Yarom.","author":"Weisse Ofir","year":"2018","unstructured":"Ofir Weisse, Jo Van Bulck, Marina Minkin, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Raoul Strackx, Thomas F. Wenisch, and Yuval Yarom. 2018. Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution. Technical report (2018)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382299"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_56_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In 25th USENIX Security Symposium (USENIX Security 16). 707--720."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3374664.3375749","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375749","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375749"}},"subtitle":["Practical Multi-User Oblivious Storage via Secure Enclaves"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":54,"alternative-id":["10.1145\/3374664.3375749","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375749","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}