{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T17:19:54Z","timestamp":1756574394151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["780681"],"award-info":[{"award-number":["780681"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["174223256"],"award-info":[{"award-number":["174223256"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3423211.3425677","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:03:11Z","timestamp":1607727791000},"page":"178-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["TEEMon"],"prefix":"10.1145","author":[{"given":"Robert","family":"Krahn","sequence":"first","affiliation":[{"name":"TU Dresden"}]},{"given":"Donald","family":"Dragoti","sequence":"additional","affiliation":[{"name":"TU Dresden"}]},{"given":"Franz","family":"Gregor","sequence":"additional","affiliation":[{"name":"TU Dresden, Scontain UG"}]},{"given":"Do Le","family":"Quoc","sequence":"additional","affiliation":[{"name":"TU Dresden, Scontain UG"}]},{"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Neuch\u00e2tel"}]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Neuch\u00e2tel"}]},{"given":"Clenimar","family":"Souza","sequence":"additional","affiliation":[{"name":"Universidade Federal de Campina Grande"}]},{"given":"Andrey","family":"Brito","sequence":"additional","affiliation":[{"name":"Universidade Federal de Campina Grande"}]},{"given":"Christof","family":"Fetzer","sequence":"additional","affiliation":[{"name":"TU Dresden, Scontain UG"}]}],"member":"320","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"volume-title":"https:\/\/www.solarwinds.com. Accessed","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"1999. SolarWinds. https:\/\/www.solarwinds.com. Accessed : Sept. 2020 . 1999. SolarWinds. https:\/\/www.solarwinds.com. Accessed: Sept. 2020."},{"volume-title":"https:\/\/dynatrace.com. Accessed","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"2005. Dynatrace. https:\/\/dynatrace.com. Accessed : Sept. 2020 . 2005. Dynatrace. https:\/\/dynatrace.com. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.mongodb.com\/. Accessed","author":"DB.","year":"2020","unstructured":"2007. Mongo DB. https:\/\/www.mongodb.com\/. Accessed : Sept. 2020 . 2007. MongoDB. https:\/\/www.mongodb.com\/. Accessed: Sept. 2020."},{"volume-title":"https:\/\/www.appdynamics.com. Accessed","year":"2020","key":"e_1_3_2_1_4_1","unstructured":"2008. AppDynamics. https:\/\/www.appdynamics.com. Accessed : Sept. 2020 . 2008. AppDynamics. https:\/\/www.appdynamics.com. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/newrelic.com. Accessed","author":"Relic New","year":"2020","unstructured":"2008. New Relic . https:\/\/newrelic.com. Accessed : Sept. 2020 . 2008. New Relic. https:\/\/newrelic.com. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/aws.amazon.com\/cloudwatch\/. Accessed","author":"CloudWatch Amazon","year":"2020","unstructured":"2010. Amazon CloudWatch . https:\/\/aws.amazon.com\/cloudwatch\/. Accessed : Sept. 2020 . 2010. Amazon CloudWatch. https:\/\/aws.amazon.com\/cloudwatch\/. Accessed: Sept. 2020."},{"volume-title":"https:\/\/www.datadoghq.com. Accessed","year":"2020","key":"e_1_3_2_1_7_1","unstructured":"2010. Datadog. https:\/\/www.datadoghq.com. Accessed : Sept. 2020 . 2010. Datadog. https:\/\/www.datadoghq.com. Accessed: Sept. 2020."},{"volume-title":"Flask micro web framework. https:\/\/palletsprojects.com\/p\/flask\/. Accessed","year":"2020","key":"e_1_3_2_1_8_1","unstructured":"2010. Flask micro web framework. https:\/\/palletsprojects.com\/p\/flask\/. Accessed : Sept. 2020 . 2010. Flask micro web framework. https:\/\/palletsprojects.com\/p\/flask\/. Accessed: Sept. 2020."},{"volume-title":"https:\/\/codeascraft.com\/2011\/02\/15\/measure-anything-measure-everything\/. Accessed","year":"2020","key":"e_1_3_2_1_9_1","unstructured":"2011. Statsd. https:\/\/codeascraft.com\/2011\/02\/15\/measure-anything-measure-everything\/. Accessed : Sept. 2020 . 2011. Statsd. https:\/\/codeascraft.com\/2011\/02\/15\/measure-anything-measure-everything\/. Accessed: Sept. 2020."},{"volume-title":"Prometheus - Monitoring system & time series database. https:\/\/prometheus.io\/docs\/introduction\/overview\/. Accessed","year":"2020","key":"e_1_3_2_1_10_1","unstructured":"2012. Prometheus - Monitoring system & time series database. https:\/\/prometheus.io\/docs\/introduction\/overview\/. Accessed : Sept. 2020 . 2012. Prometheus - Monitoring system & time series database. https:\/\/prometheus.io\/docs\/introduction\/overview\/. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.ibm.com\/cloud\/. Accessed","author":"Cloud IBM","year":"2020","unstructured":"2013. IBM Cloud . https:\/\/www.ibm.com\/cloud\/. Accessed : Sept. 2020 . 2013. IBM Cloud. https:\/\/www.ibm.com\/cloud\/. Accessed: Sept. 2020."},{"volume-title":"https:\/\/www.signalfx.com. Accessed","year":"2020","key":"e_1_3_2_1_12_1","unstructured":"2013. SignalFx. https:\/\/www.signalfx.com. Accessed : Sept. 2020 . 2013. SignalFx. https:\/\/www.signalfx.com. Accessed: Sept. 2020."},{"volume-title":"Google Cloud's Operations. https:\/\/cloud.google.com\/products\/operations. Accessed","year":"2020","key":"e_1_3_2_1_13_1","unstructured":"2014. Google Cloud's Operations. https:\/\/cloud.google.com\/products\/operations. Accessed : Sept. 2020 . 2014. Google Cloud's Operations. https:\/\/cloud.google.com\/products\/operations. Accessed: Sept. 2020."},{"volume-title":"https:\/\/grafana.com. Accessed","year":"2020","key":"e_1_3_2_1_14_1","unstructured":"2014. Grafana. https:\/\/grafana.com. Accessed : Sept. 2020 . 2014. Grafana. https:\/\/grafana.com. Accessed: Sept. 2020."},{"volume-title":"eBPF Maps. https:\/\/prototype-kernel.readthedocs.io\/en\/latest\/bpf\/ebpf_maps.html. Accessed","year":"2020","key":"e_1_3_2_1_15_1","unstructured":"2016. eBPF Maps. https:\/\/prototype-kernel.readthedocs.io\/en\/latest\/bpf\/ebpf_maps.html. Accessed : Sept. 2020 . 2016. eBPF Maps. https:\/\/prototype-kernel.readthedocs.io\/en\/latest\/bpf\/ebpf_maps.html. Accessed: Sept. 2020."},{"volume-title":"Intel Linux SGX Driver. https:\/\/github.com\/intel\/linux-sgx-driver. Accessed","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"2016. Intel Linux SGX Driver. https:\/\/github.com\/intel\/linux-sgx-driver. Accessed : Sept. 2020 . 2016. Intel Linux SGX Driver. https:\/\/github.com\/intel\/linux-sgx-driver. Accessed: Sept. 2020."},{"volume-title":"The OpenMetrics project. https:\/\/www.openmetrics.io. Accessed","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"2017. The OpenMetrics project. https:\/\/www.openmetrics.io. Accessed : Sept. 2020 . 2017. The OpenMetrics project. https:\/\/www.openmetrics.io. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/developer.ibm.com\/articles\/l-support-protected-computing\/. Accessed","author":"IBM","year":"2020","unstructured":"2018. IBM PEF. https:\/\/developer.ibm.com\/articles\/l-support-protected-computing\/. Accessed : Sept. 2020 . 2018. IBM PEF. https:\/\/developer.ibm.com\/articles\/l-support-protected-computing\/. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/cloud.ibm.com\/docs\/services\/Monitoring-with-Sysdig. Accessed","author":"Sysdig IBM","year":"2020","unstructured":"2018. IBM Sysdig . https:\/\/cloud.ibm.com\/docs\/services\/Monitoring-with-Sysdig. Accessed : Sept. 2020 . 2018. IBM Sysdig. https:\/\/cloud.ibm.com\/docs\/services\/Monitoring-with-Sysdig. Accessed: Sept. 2020."},{"volume-title":"Building large clusters - Kubernetes. https:\/\/kubernetes.io\/docs\/setup\/best-practices\/cluster-large. Accessed","year":"2020","key":"e_1_3_2_1_20_1","unstructured":"2019. Building large clusters - Kubernetes. https:\/\/kubernetes.io\/docs\/setup\/best-practices\/cluster-large. Accessed : Sept. 2020 . 2019. Building large clusters - Kubernetes. https:\/\/kubernetes.io\/docs\/setup\/best-practices\/cluster-large. Accessed: Sept. 2020."},{"volume-title":"Intel Trust Domain Extensions. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdx-whitepaper-v4.pdf. Accessed","year":"2020","key":"e_1_3_2_1_21_1","unstructured":"2020. Intel Trust Domain Extensions. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdx-whitepaper-v4.pdf. Accessed : Sept. 2020 . 2020. Intel Trust Domain Extensions. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdx-whitepaper-v4.pdf. Accessed: Sept. 2020."},{"volume-title":"New DCsv2-series virtual machines are now available. https:\/\/azure.microsoft.com\/en-au\/updates\/new-dcsv2series-virtual-machines-are-now-available. Accessed","year":"2020","key":"e_1_3_2_1_22_1","unstructured":"2020. New DCsv2-series virtual machines are now available. https:\/\/azure.microsoft.com\/en-au\/updates\/new-dcsv2series-virtual-machines-are-now-available. Accessed : Sept. 2020 . 2020. New DCsv2-series virtual machines are now available. https:\/\/azure.microsoft.com\/en-au\/updates\/new-dcsv2series-virtual-machines-are-now-available. Accessed: Sept. 2020."},{"volume-title":"https:\/\/sconedocs.github.io\/teemon\/. Accessed","year":"2020","key":"e_1_3_2_1_23_1","unstructured":"2020. TEEMon. https:\/\/sconedocs.github.io\/teemon\/. Accessed : Sept. 2020 . 2020. TEEMon. https:\/\/sconedocs.github.io\/teemon\/. Accessed: Sept. 2020."},{"volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP).","author":"Anati Ittai","key":"e_1_3_2_1_24_1","unstructured":"Ittai Anati , Shay Gueron , P. Simon Johnson , and R. Vincent Scarlata . 2013. Innovative technology for CPU based attestation and sealing . In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). Ittai Anati, Shay Gueron, P. Simon Johnson, and R. Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'keeffe , Mark L Stillwell , 2016 . SCONE: Secure Linux Containers with Intel SGX . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'keeffe, Mark L Stillwell, et al. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00050"},{"key":"e_1_3_2_1_27_1","volume-title":"Optimally Profiling and Tracing Programs. ACM Transactions on Programming Languages and Systems","author":"Ball Thomas","year":"1994","unstructured":"Thomas Ball and James R Larus . 1994. Optimally Profiling and Tracing Programs. ACM Transactions on Programming Languages and Systems ( 1994 ). Thomas Ball and James R Larus. 1994. Optimally Profiling and Tracing Programs. ACM Transactions on Programming Languages and Systems (1994)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Andrew Baumann Marcus Peinado and Galen Hunt. 2015. Shielding Applications from an Untrusted Cloud with Haven. In ACM Transactions on Computer Systems (TOCS).  Andrew Baumann Marcus Peinado and Galen Hunt. 2015. Shielding Applications from an Untrusted Cloud with Haven. In ACM Transactions on Computer Systems (TOCS).","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_29_1","volume-title":"CPU support for secure execution. Technical report","author":"Boivie Rick","year":"2012","unstructured":"Rick Boivie and Peter Williams . 2012. SecureBlue++ : CPU support for secure execution. Technical report ( 2012 ). Rick Boivie and Peter Williams. 2012. SecureBlue++: CPU support for secure execution. Technical report (2012)."},{"volume-title":"System and Application Monitoring and Troubleshooting with Sysdig","author":"Borello Gianluca","key":"e_1_3_2_1_30_1","unstructured":"Gianluca Borello . 2015. System and Application Monitoring and Troubleshooting with Sysdig . USENIX Association . Gianluca Borello. 2015. System and Application Monitoring and Troubleshooting with Sysdig. USENIX Association."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"volume-title":"Prometheus exporter for custom eBPF metrics. https:\/\/github.com\/cloudflare\/ebpf_exporter. Accessed","year":"2020","key":"e_1_3_2_1_32_1","unstructured":"Cloudflare. 2019. Prometheus exporter for custom eBPF metrics. https:\/\/github.com\/cloudflare\/ebpf_exporter. Accessed : Sept. 2020 . Cloudflare. 2019. Prometheus exporter for custom eBPF metrics. https:\/\/github.com\/cloudflare\/ebpf_exporter. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptology ePrint Archive ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_34_1","unstructured":"Arnaldo Carvalho De Melo. 2010. The new linux 'perf' tools. In Slides from Linux Kongress.  Arnaldo Carvalho De Melo. 2010. The new linux 'perf' tools. In Slides from Linux Kongress."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006373706960703"},{"key":"e_1_3_2_1_36_1","unstructured":"Sasha Goldshtein. 2016. The Next Linux Superpower: eBPF Primer. In USENIX SREcon.  Sasha Goldshtein. 2016. The Next Linux Superpower: eBPF Primer. In USENIX SREcon."},{"volume-title":"cAdvisor Runtime Options. https:\/\/github.com\/google\/cadvisor\/blob\/master\/docs\/runtime_options.md. Accessed","year":"2020","key":"e_1_3_2_1_37_1","unstructured":"Google. 2020. cAdvisor Runtime Options. https:\/\/github.com\/google\/cadvisor\/blob\/master\/docs\/runtime_options.md. Accessed : Sept. 2020 . Google. 2020. cAdvisor Runtime Options. https:\/\/github.com\/google\/cadvisor\/blob\/master\/docs\/runtime_options.md. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_38_1","unstructured":"Sudhanshu Goswami. 2005. An introduction to KProbes. LWN-Linux Weekly News-online.  Sudhanshu Goswami. 2005. An introduction to KProbes. LWN-Linux Weekly News-online."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989401"},{"volume-title":"Flask web development: developing web applications with python","author":"Grinberg Miguel","key":"e_1_3_2_1_40_1","unstructured":"Miguel Grinberg . 2018. Flask web development: developing web applications with python . O'Reilly Media, Inc. Miguel Grinberg. 2018. Flask web development: developing web applications with python. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"J Alex Halderman Seth D Schoen Nadia Heninger William Clarkson William Paul Joseph A Calandrino Ariel J Feldman Jacob Appelbaum and Edward W Felten. 2009. Lest we remember: cold-boot attacks on encryption keys. In Communications of the ACM.  J Alex Halderman Seth D Schoen Nadia Heninger William Clarkson William Paul Joseph A Calandrino Ariel J Feldman Jacob Appelbaum and Edward W Felten. 2009. Lest we remember: cold-boot attacks on encryption keys. In Communications of the ACM.","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_42_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. White paper.  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. White paper."},{"volume-title":"Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/blogs\/bluemix\/2018\/05\/data-use-protection-ibm-cloud-using-intel-sgx. Accessed","year":"2020","key":"e_1_3_2_1_43_1","unstructured":"Karnati. 2018. Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/blogs\/bluemix\/2018\/05\/data-use-protection-ibm-cloud-using-intel-sgx. Accessed : Sept. 2020 . Karnati. 2018. Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/blogs\/bluemix\/2018\/05\/data-use-protection-ibm-cloud-using-intel-sgx. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303951"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC).","author":"Lachaize Renaud","year":"2012","unstructured":"Renaud Lachaize , Baptiste Lepers , and Vivien Qu\u00e9ma . 2012 . MemProf: A Memory Profiler for NUMA Multicore Systems . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). Renaud Lachaize, Baptiste Lepers, and Vivien Qu\u00e9ma. 2012. MemProf: A Memory Profiler for NUMA Multicore Systems. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_47_1","volume-title":"Monitoring Intel SGX Enclaves. https:\/\/fortanix.com\/blog\/2020\/02\/monitoring-intel-sgx-enclaves\/. Accessed","author":"Lahey Kevin","year":"2020","unstructured":"Kevin Lahey . 2020. Monitoring Intel SGX Enclaves. https:\/\/fortanix.com\/blog\/2020\/02\/monitoring-intel-sgx-enclaves\/. Accessed : Sept. 2020 . Kevin Lahey. 2020. Monitoring Intel SGX Enclaves. https:\/\/fortanix.com\/blog\/2020\/02\/monitoring-intel-sgx-enclaves\/. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 27th USENIX Security Symposium USENIX Security).","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , 2018 . Meltdown: Reading kernel memory from user space . In Proceedings of the 27th USENIX Security Symposium USENIX Security). Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, et al. 2018. Meltdown: Reading kernel memory from user space. In Proceedings of the 27th USENIX Security Symposium USENIX Security)."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX Winter Conference (USENIX).","author":"McCanne Steven","year":"1993","unstructured":"Steven McCanne and Van Jacobson . 1993 . The BSD Packet Filter: A New Architecture for User-level Packet Capture . In Proceedings of the USENIX Winter Conference (USENIX). Steven McCanne and Van Jacobson. 1993. The BSD Packet Filter: A New Architecture for User-level Packet Capture. In Proceedings of the USENIX Winter Conference (USENIX)."},{"volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP).","author":"McKeen Frank","key":"e_1_3_2_1_50_1","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R. Savagaonkar . 2013. Innovative instructions and software model for isolated execution . In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)."},{"key":"e_1_3_2_1_51_1","unstructured":"Dirk Merkel. 2014. Docker: lightweight linux containers for consistent development and deployment. Linux Journal.  Dirk Merkel. 2014. Docker: lightweight linux containers for consistent development and deployment. Linux Journal."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988346"},{"key":"e_1_3_2_1_54_1","unstructured":"Christian Priebe Divya Muthukumaran Joshua Lind Huanzhou Zhu Shujie Cui Vasily A Sartakov and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. In arXiv.1908.11143.  Christian Priebe Divya Muthukumaran Joshua Lind Huanzhou Zhu Shujie Cui Vasily A Sartakov and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. In arXiv.1908.11143."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_1_56_1","volume-title":"Nginx: the high-performance web server and reverse proxy. Linux Journal","author":"Reese Will","year":"2008","unstructured":"Will Reese . 2008. Nginx: the high-performance web server and reverse proxy. Linux Journal ( 2008 ). Will Reese. 2008. Nginx: the high-performance web server and reverse proxy. Linux Journal (2008)."},{"volume-title":"VTune performance analyzer essentials","author":"Reinders James","key":"e_1_3_2_1_57_1","unstructured":"James Reinders . 2005. VTune performance analyzer essentials . In Intel Press . James Reinders. 2005. VTune performance analyzer essentials. In Intel Press."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2017.115"},{"volume-title":"Linux device drivers","author":"Rubini Alessandro","key":"e_1_3_2_1_59_1","unstructured":"Alessandro Rubini and Jonathan Corbet . 2001. Linux device drivers . O'Reilly Media, Inc. Alessandro Rubini and Jonathan Corbet. 2001. Linux device drivers. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_60_1","volume-title":"http:\/\/redis.io. Accessed","author":"Sanfilippo Salvatore","year":"2020","unstructured":"Salvatore Sanfilippo . 2009. Redis. http:\/\/redis.io. Accessed : Sept. 2020 . Salvatore Sanfilippo. 2009. Redis. http:\/\/redis.io. Accessed: Sept. 2020."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00024"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268942"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.38"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX).","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX . In Proceedings of the USENIX Annual Technical Conference (USENIX). Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the USENIX Annual Technical Conference (USENIX)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00076"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022263"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 21st International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425677","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423211.3425677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:57Z","timestamp":1750195497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425677"}},"subtitle":["A continuous performance monitoring framework for TEEs"],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":70,"alternative-id":["10.1145\/3423211.3425677","10.1145\/3423211"],"URL":"https:\/\/doi.org\/10.1145\/3423211.3425677","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}