{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652836,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011103","name":"European Commission","doi-asserted-by":"publisher","award":["826232"],"award-info":[{"award-number":["826232"]}],"id":[{"id":"10.13039\/100011103","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427296","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"526-541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Oblivious Substring Search via Architectural Support"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Mainardi","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Davide","family":"Sampietro","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Alessandro","family":"Barenghi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Gerardo","family":"Pelosi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","year":"2019","author":"Ahmad Adil","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312496"},{"volume-title":"Nucleic Acids Res. (Jan","year":"2013","author":"Benson DA","key":"e_1_3_2_1_3_1"},{"volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies, WOOT 2017","year":"2017","author":"Brasser Ferdinand","key":"e_1_3_2_1_4_1"},{"volume-title":"27th USENIX Security Symposium, USENIX Security 2018","year":"2018","author":"Bulck Jo\u00a0Van","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_7_1","unstructured":"Jo\u00a0Van Bulck Nico Weichbrodt R\u00fcdiger Kapitza Frank Piessens and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution See Kirda and Ristenpart [23] 1041\u20131056.  Jo\u00a0Van Bulck Nico Weichbrodt R\u00fcdiger Kapitza Frank Piessens and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution See Kirda and Ristenpart [23] 1041\u20131056."},{"key":"e_1_3_2_1_9_1","unstructured":"David Cash Paul Grubbs Jason Perry and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption See Ray et\u00a0al. [35] 668\u2013679. http:\/\/dl.acm.org\/citation.cfm?id=2810103  David Cash Paul Grubbs Jason Perry and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption See Ray et\u00a0al. [35] 668\u2013679. http:\/\/dl.acm.org\/citation.cfm?id=2810103"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1515\/popets-2015-0014","article-title":"Substring-Searchable Symmetric Encryption","volume":"2015","author":"Chase Melissa","year":"2015","journal-title":"PoPETs"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkp1137"},{"key":"e_1_3_2_1_12_1","unstructured":"Intel Corporation. 2019. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) SDK for Linux* OS (v2.5 ed.). https:\/\/download.01.org\/intel-sgx\/linux-2.5\/docs\/  Intel Corporation. 2019. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) SDK for Linux* OS (v2.5 ed.). https:\/\/download.01.org\/intel-sgx\/linux-2.5\/docs\/"},{"key":"e_1_3_2_1_13_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082036.1082039"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-171103"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"volume-title":"PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings(Lecture Notes in Computer Science), Vol.\u00a07981","year":"2013","author":"Gentry Craig","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Daniel Gruss Julian Lettner Felix Schuster Olga Ohrimenko Istv\u00e1n Haller and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory See Kirda and Ristenpart [23] 217\u2013233.  Daniel Gruss Julian Lettner Felix Schuster Olga Ohrimenko Istv\u00e1n Haller and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory See Kirda and Ristenpart [23] 217\u2013233."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel Corporation. 2018. Description and mitigation overview for L1 Terminal Fault. https:\/\/software.intel.com\/security-software-guidance\/software-guidance\/l1-terminal-fault  Intel Corporation. 2018. Description and mitigation overview for L1 Terminal Fault. https:\/\/software.intel.com\/security-software-guidance\/software-guidance\/l1-terminal-fault"},{"volume-title":"Deep Dive: Load Value Injection. https:\/\/software.intel.com\/security-software-guidance\/insights\/deep-dive-load-value-injection","year":"2020","author":"Intel Corporation","key":"e_1_3_2_1_20_1"},{"volume-title":"Deep Dive: Special Register Buffer Data Sampling. https:\/\/software.intel.com\/security-software-guidance\/insights\/deep-dive-special-register-buffer-data-sampling","year":"2020","author":"Intel Corporation","key":"e_1_3_2_1_21_1"},{"volume-title":"Private Substring Search on Homomorphically Encrypted Data. In 2017 IEEE International Conference on Smart Computing, SMARTCOMP 2017","year":"2017","author":"Ishimaki Yu","key":"e_1_3_2_1_22_1"},{"volume-title":"26th USENIX Security Symposium, USENIX Security 2017","year":"2017","author":"Kirda Engin","key":"e_1_3_2_1_23_1"},{"volume-title":"Machine Learning: ECML","year":"2004","author":"Klimt Bryan","key":"e_1_3_2_1_24_1"},{"volume-title":"The Art of Computer Programming, Volume 2: Seminumerical Algorithms","author":"Knuth E.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201595.3201598"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359842"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0222058"},{"volume-title":"Oblix: An Efficient Oblivious Search Index. In 2018 IEEE Symposium on Security and Privacy, SP 2018","year":"2018","author":"Mishra Pratyush","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","first-page":"722","article-title":"Oblivious Substring Search with Updates","volume":"2015","author":"Moataz Tarik","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2009.42"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"volume-title":"2018 USENIX Annual Technical Conference, USENIX ATC 2018","year":"2018","author":"Oleksenko Oleksii","key":"e_1_3_2_1_33_1"},{"volume-title":"CrossTalk: Speculative Data Leaks Across Cores Are Real. In 42th IEEE Symposium on Security and Privacy (S&P\u201921)","year":"2021","author":"Ragab Hany","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103"},{"volume-title":"24th USENIX Security Symposium, USENIX Security 15","year":"2015","author":"Ren Ling","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670339"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1515\/popets-2017-0034","article-title":"A Leakage-Abuse Attack Against Multi-User Searchable Encryption","volume":"2017","author":"Rompay C\u00e9dric\u00a0Van","year":"2017","journal-title":"PoPETs"},{"key":"e_1_3_2_1_39_1","unstructured":"Davide Sampietro and Nicholas Mainardi. 2020. ObSQRE: Oblivious Substring Queries on Remote Enclave. https:\/\/github.com\/DavideSampietro\/ObSQRE  Davide Sampietro and Nicholas Mainardi. 2020. ObSQRE: Oblivious Substring Queries on Remote Enclave. https:\/\/github.com\/DavideSampietro\/ObSQRE"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"volume-title":"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","year":"2017","author":"Shih Ming-Wei","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw050"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_45_1","unstructured":"Larry Stefonic and Todd Ouska. 2019. The wolfSSL Embedded TLS Library. https:\/\/www.wolfssl.com\/  Larry Stefonic and Todd Ouska. 2019. The wolfSSL Embedded TLS Library. https:\/\/www.wolfssl.com\/"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi8030028"},{"volume-title":"UniProt: the universal protein knowledgebase. Nucleic Acids Research 46, 5 (02","year":"2018","author":"The UniProt Consortium","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057178"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang T.-H.\u00a0Hubert Chan and Elaine Shi. 2015. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound See Ray et\u00a0al. [35] 850\u2013861. https:\/\/doi.org\/10.1145\/2810103.2813634  Xiao Wang T.-H.\u00a0Hubert Chan and Elaine Shi. 2015. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound See Ray et\u00a0al. [35] 850\u2013861. https:\/\/doi.org\/10.1145\/2810103.2813634","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy, SP 2015","year":"2015","author":"Xu Yuanzhong","key":"e_1_3_2_1_51_1"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":50,"alternative-id":["10.1145\/3427228.3427296","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427296","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}