{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:10Z","timestamp":1750220530908,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T00:00:00Z","timestamp":1602892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,17]]},"DOI":"10.1145\/3458903.3458911","type":"proceedings-article","created":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T16:06:02Z","timestamp":1635005162000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing"],"prefix":"10.1145","author":[{"given":"Deeksha","family":"Dangwal","sequence":"first","affiliation":[{"name":"Facebook, USA"}]},{"given":"Meghan","family":"Cowan","sequence":"additional","affiliation":[{"name":"Facebook, USA"}]},{"given":"Armin","family":"Alaghi","sequence":"additional","affiliation":[{"name":"Facebook, USA"}]},{"given":"Vincent T.","family":"Lee","sequence":"additional","affiliation":[{"name":"Facebook, USA"}]},{"given":"Brandon","family":"Reagen","sequence":"additional","affiliation":[{"name":"New York University, USA"}]},{"given":"Caronline","family":"Trippel","sequence":"additional","affiliation":[{"name":"Stanford University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1997. Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard.  1997. Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process.  2019. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process.  2020. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process."},{"volume-title":"Trustzone: Integrated hardware and software security. White paper","year":"2004","author":"Alves Tiago","key":"e_1_3_2_1_4_1"},{"volume-title":"Serpent: A Proposal for the Advanced Encryption Standard.","year":"1998","author":"Anderson J.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026930"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893582.2893591"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_9_1","unstructured":"Carolynn Burwick Don Coppersmith Edward D\u2019Avignon Rosario Gennaro Shai Halevi Charanjit Jutla Stephen M.\u00a0Matyas  Jr. Luke O\u2019Connor Mohammad Peyravian David Safford and Nevenko Zunic. 1998. MARS - a candidate cipher for AES.  Carolynn Burwick Don Coppersmith Edward D\u2019Avignon Rosario Gennaro Shai Halevi Charanjit Jutla Stephen M.\u00a0Matyas Jr. Luke O\u2019Connor Mohammad Peyravian David Safford and Nevenko Zunic. 1998. MARS - a candidate cipher for AES."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3310435.3310585"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00053"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241161"},{"key":"e_1_3_2_1_14_1","unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999).  Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752403"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241195"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"volume-title":"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.. In Ndss, Vol.\u00a012. 1\u201315.","year":"2012","author":"Eldefrawy Karim","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"volume-title":"Somewhat Practical Fully Homomorphic Encryption.IACR Cryptology ePrint Archive 2012","year":"2012","author":"Fan Junfeng","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480359.2429113"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008697"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045413"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831200"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"volume-title":"AES Candidate Conference, Vol.\u00a02000","year":"2000","author":"Ichikawa Tetsuya","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714625"},{"volume-title":"Gazelle: A low latency framework for secure neural network inference. arXiv preprint arXiv:1801.05507(2018).","year":"2018","author":"Juvekar Chiraag","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.232469"},{"volume-title":"AMD memory encryption. White paper","year":"2016","author":"Kaplan David","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897962"},{"volume-title":"Proceedings of the second AES Candidate Conference. 109\u2013114","year":"1999","author":"Keating Geoffrey","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","unstructured":"Georgios Kellaris George Kollios Kobbi Nissim and Adam O\u2019Neill. 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552(2017).  Georgios Kellaris George Kollios Kobbi Nissim and Adam O\u2019Neill. 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552(2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154690.3154718"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241138"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277276"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.85"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2403359"},{"volume-title":"Innovative instructions and software model for isolated execution.Hasp@ isca 10, 1","year":"2013","author":"McKeen Frank","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_52_1","unstructured":"Krishna\u00a0Giri Narra Zhifeng Lin Yongqin Wang Keshav Balasubramaniam and Murali Annavaram. 2019. Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments. arXiv preprint arXiv:1912.03485(2019).  Krishna\u00a0Giri Narra Zhifeng Lin Yongqin Wang Keshav Balasubramaniam and Murali Annavaram. 2019. Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments. arXiv preprint arXiv:1912.03485(2019)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360598"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.6028\/jres.106.023"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361437"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_57_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit.  Colin Percival. 2005. Cache missing for fun and profit."},{"volume-title":"Cheetah: Optimizations and Methods for PrivacyPreserving Inference via Homomorphic Encryption. arXiv preprint arXiv:2006.00505(2020).","year":"2020","author":"Reagen Brandon","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1932681.1863568"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_61_1","unstructured":"Ronald\u00a0L Rivest Matthew\u00a0JB Robshaw Ray Sidney and Yiqun\u00a0L Yin. [n.d.]. The RC6TM block cipher.  Ronald\u00a0L Rivest Matthew\u00a0JB Robshaw Ray Sidney and Yiqun\u00a0L Yin. [n.d.]. The RC6TM block cipher."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855731"},{"key":"e_1_3_2_1_64_1","unstructured":"Th\u00e9o Ryffel Edouard Dufour-Sans Romain Gay Francis Bach and David Pointcheval. 2019. Partially encrypted machine learning using functional encryption. arXiv preprint arXiv:1905.10214(2019).  Th\u00e9o Ryffel Edouard Dufour-Sans Romain Gay Francis Bach and David Pointcheval. 2019. Partially encrypted machine learning using functional encryption. arXiv preprint arXiv:1905.10214(2019)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019312.2019313"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/299586"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154690.3154752"},{"key":"e_1_3_2_1_68_1","unstructured":"Wenhao Wang Yichen Jiang Qintao Shen Weihao Huang Hao Chen Shuang Wang XiaoFeng Wang Haixu Tang Kai Chen Kristin Lauter 2019. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. arXiv preprint arXiv:1905.07766(2019).  Wenhao Wang Yichen Jiang Qintao Shen Weihao Huang Hao Chen Shuang Wang XiaoFeng Wang Haixu Tang Kai Chen Kristin Lauter 2019. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. arXiv preprint arXiv:1905.07766(2019)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671271"}],"event":{"name":"HASP '20: Hardware and Architectural Support for Security and Privacy","acronym":"HASP '20","location":"Virtual Greece"},"container-title":["Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458903.3458911","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458903.3458911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:55Z","timestamp":1750195495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458903.3458911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,17]]},"references-count":69,"alternative-id":["10.1145\/3458903.3458911","10.1145\/3458903"],"URL":"https:\/\/doi.org\/10.1145\/3458903.3458911","relation":{},"subject":[],"published":{"date-parts":[[2020,10,17]]},"assertion":[{"value":"2021-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}