{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:02:37Z","timestamp":1772082157797,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Foundation ? Flanders (FWO)"},{"name":"Research Fund KU Leuven"},{"name":"Engineering and Physical Sciences Research Council (EPSRC)","award":["EP\/R012598\/1, EP\/S030867\/1"],"award-info":[{"award-number":["EP\/R012598\/1, EP\/S030867\/1"]}]},{"name":"European Union Horizon 2020 research and innovation programme","award":["No. 779391 (FutureTPM)"],"award-info":[{"award-number":["No. 779391 (FutureTPM)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427270","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"415-427","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Faulty Point Unit: ABI Poisoning Attacks on Intel SGX"],"prefix":"10.1145","author":[{"given":"Fritz","family":"Alder","sequence":"first","affiliation":[{"name":"KU Leuven, Belgium"}]},{"given":"Jo","family":"Van Bulck","sequence":"additional","affiliation":[{"name":"KU Leuven, Belgium"}]},{"given":"David","family":"Oswald","sequence":"additional","affiliation":[{"name":"The University of Birmingham, UK"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358916"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. 1213\u20131227","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . 2018 . The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX . In Proceedings of the 27th USENIX Security Symposium. 1213\u20131227 . Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In Proceedings of the 27th USENIX Security Symposium. 1213\u20131227."},{"key":"e_1_3_2_1_4_1","unstructured":"Mike Bursell. 2019. Trust No One Run Everywhere\u2014Introducing Enarx.  Mike Bursell. 2019. Trust No One Run Everywhere\u2014Introducing Enarx."},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 253\u2013264","author":"Checkoway S.","unstructured":"S. Checkoway and H. Shacham . 2013. Iago attacks: Why the system call API is a bad untrusted RPC interface . In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 253\u2013264 . S. Checkoway and H. Shacham. 2013. Iago attacks: Why the system call API is a bad untrusted RPC interface. In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 253\u2013264."},{"key":"e_1_3_2_1_6_1","volume-title":"4th IEEE European Symposium on Security and Privacy (Euro S&P). IEEE.","author":"Chen Guoxing","year":"2019","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten\u00a0 H Lai . 2019 . SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution . In 4th IEEE European Symposium on Security and Privacy (Euro S&P). IEEE. Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten\u00a0H Lai. 2019. SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution. In 4th IEEE European Symposium on Security and Privacy (Euro S&P). IEEE."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 29th USENIX Security Symposium. 841\u2013858","author":"Cloosters Tobias","year":"2020","unstructured":"Tobias Cloosters , Michael Rodler , and Lucas Davi . 2020 . TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves . In Proceedings of the 29th USENIX Security Symposium. 841\u2013858 . Tobias Cloosters, Michael Rodler, and Lucas Davi. 2020. TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In Proceedings of the 29th USENIX Security Symposium. 841\u2013858."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Corporation. 2017. Intel software guard extensions SDK for Linux OS: Developer reference.  Intel Corporation. 2017. Intel software guard extensions SDK for Linux OS: Developer reference."},{"key":"e_1_3_2_1_10_1","unstructured":"V. Costan and S. Devadas. 2016. Intel SGX explained.IACR Cryptology ePrint Archive 2016 086 (2016) 1\u2013118.  V. Costan and S. Devadas. 2016. Intel SGX explained.IACR Cryptology ePrint Archive 2016 086 (2016) 1\u2013118."},{"key":"e_1_3_2_1_11_1","unstructured":"J. Edge. 2008. CVE-2008-1367: Kernel doesn\u2019t clear DF for signal handlers. https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=437312.  J. Edge. 2008. CVE-2008-1367: Kernel doesn\u2019t clear DF for signal handlers. https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=437312."},{"key":"e_1_3_2_1_12_1","unstructured":"A. Fog. 2018. Calling conventions for different C++ compilers and operating systems. http:\/\/www.agner.org\/optimize\/calling_conventions.pdf.  A. Fog. 2018. Calling conventions for different C++ compilers and operating systems. http:\/\/www.agner.org\/optimize\/calling_conventions.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"Fortanix. 2019. Fortanix Enclave Development Platform \u2014 Rust EDP. https:\/\/edp.fortanix.com\/.  Fortanix. 2019. Fortanix Enclave Development Platform \u2014 Rust EDP. https:\/\/edp.fortanix.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Free Software Foundation. 2020. GCC the GNU Compiler Collection. https:\/\/gcc.gnu.org\/.  Free Software Foundation. 2020. GCC the GNU Compiler Collection. https:\/\/gcc.gnu.org\/."},{"key":"e_1_3_2_1_15_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Ghosn Adrien","year":"2019","unstructured":"Adrien Ghosn , James\u00a0 R Larus , and Edouard Bugnion . 2019 . Secured routines: language-based construction of trusted execution environments . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . 571\u2013586. Adrien Ghosn, James\u00a0R Larus, and Edouard Bugnion. 2019. Secured routines: language-based construction of trusted execution environments. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 571\u2013586."},{"key":"e_1_3_2_1_16_1","volume-title":"Asylo: An open and flexible framework for enclave applications. https:\/\/asylo.dev\/.","year":"2019","unstructured":"Google. 2019 . Asylo: An open and flexible framework for enclave applications. https:\/\/asylo.dev\/. Google. 2019. Asylo: An open and flexible framework for enclave applications. https:\/\/asylo.dev\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94496-8_4"},{"key":"e_1_3_2_1_18_1","unstructured":"IBM. [n.d.]. Data-in-use protection on IBM cloud. https:\/\/www.ibm.com\/blogs\/bluemix\/2017\/12\/data-use-protection-ibm-cloud-ibm-intel-fortanix-partner-keep-enterprises-secure-core\/.  IBM. [n.d.]. Data-in-use protection on IBM cloud. https:\/\/www.ibm.com\/blogs\/bluemix\/2017\/12\/data-use-protection-ibm-cloud-ibm-intel-fortanix-partner-keep-enterprises-secure-core\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel Corporation. 2019. Intel Software Guard Extensions \u2013 Get Started with the SDK. https:\/\/software.intel.com\/en-us\/sgx\/sdk.  Intel Corporation. 2019. Intel Software Guard Extensions \u2013 Get Started with the SDK. https:\/\/software.intel.com\/en-us\/sgx\/sdk."},{"key":"e_1_3_2_1_20_1","unstructured":"Intel Corporation. 2020. Intel 64 and IA-32 architectures software developer\u2019s manual \u2013 Combined volumes. Reference no. 325462-062US.  Intel Corporation. 2020. Intel 64 and IA-32 architectures software developer\u2019s manual \u2013 Combined volumes. Reference no. 325462-062US."},{"key":"e_1_3_2_1_21_1","volume-title":"Convnetjs: Deep learning in your browser","author":"Karpathy Andrej","year":"2014","unstructured":"Andrej Karpathy . 2014 . Convnetjs: Deep learning in your browser (2014). URL http:\/\/cs.stanford.edu\/people\/karpathy\/convnetjs(2014). Andrej Karpathy. 2014. Convnetjs: Deep learning in your browser (2014). URL http:\/\/cs.stanford.edu\/people\/karpathy\/convnetjs(2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378486"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. 523\u2013539","author":"Lee J.","year":"2017","unstructured":"J. Lee , J. Jang , Y. Jang , N. Kwak , Y. Choi , C. Choi , T. Kim , M. Peinado , and B.\u00a0 Byunghoon Kang . 2017 . Hacking in darkness: Return-oriented programming against secure enclaves . In Proceedings of the 26th USENIX Security Symposium. 523\u2013539 . J. Lee, J. Jang, Y. Jang, N. Kwak, Y. Choi, C. Choi, T. Kim, M. Peinado, and B.\u00a0Byunghoon Kang. 2017. Hacking in darkness: Return-oriented programming against secure enclaves. In Proceedings of the 26th USENIX Security Symposium. 523\u2013539."},{"key":"e_1_3_2_1_24_1","unstructured":"S. Lee and T. Kim. 2017. Leaking uninitialized secure enclave memory via structure padding. arXiv preprint arXiv:1710.09061(2017).  S. Lee and T. Kim. 2017. Leaking uninitialized secure enclave memory via structure padding. arXiv preprint arXiv:1710.09061(2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241233"},{"key":"e_1_3_2_1_26_1","volume-title":"Version 1.1 (7","author":"Lu H.J.","year":"2015","unstructured":"H.J. Lu , David\u00a0 L Kreitzer , Milind Girkar , and Zia Ansari . 2015. System V application binary interface. Intel386 Architecture Processor Supplement , Version 1.1 (7 December 2015 ). H.J. Lu, David\u00a0L Kreitzer, Milind Girkar, and Zia Ansari. 2015. System V application binary interface. Intel386 Architecture Processor Supplement, Version 1.1 (7 December 2015)."},{"key":"e_1_3_2_1_27_1","volume-title":"NDSS","author":"Machiry A.","year":"2017","unstructured":"A. Machiry , E. Gustafson , C. Spensky , C. Salls , N. Stephens , R. Wang , A. Bianchi , Y.\u00a0 Ryn Choe , C. Kruegel , and G. Vigna . 2017. BOOMERANG: Exploiting the semantic gap in trusted execution environments . In NDSS 2017 . A. Machiry, E. Gustafson, C. Spensky, C. Salls, N. Stephens, R. Wang, A. Bianchi, Y.\u00a0Ryn Choe, C. Kruegel, and G. Vigna. 2017. BOOMERANG: Exploiting the semantic gap in trusted execution environments. In NDSS 2017."},{"key":"e_1_3_2_1_28_1","unstructured":"P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput.99(2017).  P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2017. Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput.99(2017)."},{"key":"e_1_3_2_1_29_1","unstructured":"[\n  29\n  ]  Microsoft.[n.d.]. https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/.  [29] Microsoft.[n.d.]. https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Microsoft. 2019. Open Enclave SDK. https:\/\/openenclave.io\/sdk\/.  Microsoft. 2019. Open Enclave SDK. https:\/\/openenclave.io\/sdk\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Microsoft Corporation. 2020. Microsoft Visual C++. https:\/\/docs.microsoft.com\/en-us\/cpp\/.  Microsoft Corporation. 2020. Microsoft Visual C++. https:\/\/docs.microsoft.com\/en-us\/cpp\/."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 29th USENIX Security Symposium. USENIX Association, 469\u2013486","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi , Jo\u00a0Van Bulck , Nadia Heninger , Frank Piessens , and Berk Sunar . 2020 . CopyCat: Controlled Instruction-Level Attacks on Enclaves . In Proceedings of the 29th USENIX Security Symposium. USENIX Association, 469\u2013486 . Daniel Moghimi, Jo\u00a0Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In Proceedings of the 29th USENIX Security Symposium. USENIX Association, 469\u2013486."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_35_1","unstructured":"Christian Priebe Divya Muthukumaran Joshua Lind Huanzhou Zhu Shujie Cui Vasily\u00a0A Sartakov and Peter Pietzuch. 2019. SGX-LKL: Securing the Host OS Interface for Trusted Execution. arXiv preprint arXiv:1908.11143(2019).  Christian Priebe Divya Muthukumaran Joshua Lind Huanzhou Zhu Shujie Cui Vasily\u00a0A Sartakov and Peter Pietzuch. 2019. SGX-LKL: Securing the Host OS Interface for Trusted Execution. arXiv preprint arXiv:1908.11143(2019)."},{"key":"e_1_3_2_1_36_1","unstructured":"The Apache Software Foundation. 2020. Apache Teaclave (Incubating). https:\/\/teaclave.incubator.apache.org\/.  The Apache Software Foundation. 2020. Apache Teaclave (Incubating). https:\/\/teaclave.incubator.apache.org\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"},{"key":"e_1_3_2_1_38_1","unstructured":"Chia-Che Tsai Donald Porter 2017. Graphene-SGX library OS \u2014 A library OS for Linux multi-process applications with Intel SGX support. https:\/\/github.com\/oscarlab\/graphene.  Chia-Che Tsai Donald Porter 2017. Graphene-SGX library OS \u2014 A library OS for Linux multi-process applications with Intel SGX support. https:\/\/github.com\/oscarlab\/graphene."},{"key":"e_1_3_2_1_39_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC). USENIX Association.","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald\u00a0 E Porter , and Mona Vij . 2017 . Graphene-SGX: A practical library OS for unmodified applications on SGX . In 2017 USENIX Annual Technical Conference (USENIX ATC). USENIX Association. Chia-Che Tsai, Donald\u00a0E Porter, and Mona Vij. 2017. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC). USENIX Association."},{"key":"e_1_3_2_1_40_1","unstructured":"Sami Vaarala. 2020. Duktape embeddable Javascript engine. URL https:\/\/duktape.org\/(2020).  Sami Vaarala. 2020. Duktape embeddable Javascript engine. URL https:\/\/duktape.org\/(2020)."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 27th USENIX Security Symposium.","author":"Van\u00a0Bulck J.","unstructured":"J. Van\u00a0Bulck , M. Minkin , O. Weisse , D. Genkin , B. Kasikci , F. Piessens , M. Silberstein , T.\u00a0 F. Wenisch , Y. Yarom , and R. Strackx . 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution . In Proceedings of the 27th USENIX Security Symposium. J. Van\u00a0Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci, F. Piessens, M. Silberstein, T.\u00a0F. Wenisch, Y. Yarom, and R. Strackx. 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In Proceedings of the 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_45_1","volume-title":"Asian Symposium on Programming Languages and Systems. 105\u2013123","author":"van Ginkel N.","unstructured":"N. van Ginkel , R. Strackx , and F. Piessens . 2017. Automatically generating secure wrappers for SGX enclaves from separation logic specifications . In Asian Symposium on Programming Languages and Systems. 105\u2013123 . N. van Ginkel, R. Strackx, and F. Piessens. 2017. Automatically generating secure wrappers for SGX enclaves from separation logic specifications. In Asian Symposium on Programming Languages and Systems. 105\u2013123."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354241"},{"key":"e_1_3_2_1_47_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Double-precision_floating-point_format&oldid=960696001 [Online","author":"Wikipedia","year":"2020","unstructured":"Wikipedia contributors. 2020. Double-precision floating-point format \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Double-precision_floating-point_format&oldid=960696001 [Online ; accessed 16- June - 2020 ]. Wikipedia contributors. 2020. Double-precision floating-point format \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Double-precision_floating-point_format&oldid=960696001 [Online; accessed 16-June-2020]."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":48,"alternative-id":["10.1145\/3427228.3427270","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427270","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}