{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:24:44Z","timestamp":1773786284279,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474123.3486755","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T15:41:53Z","timestamp":1636126913000},"page":"111-123","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Guardian"],"prefix":"10.1145","author":[{"given":"Pedro","family":"Antonino","sequence":"first","affiliation":[{"name":"The Blockhouse Technology Limited, Oxford, United Kingdom"}]},{"given":"Wojciech Aleksander","family":"Woloszyn","sequence":"additional","affiliation":[{"name":"The Blockhouse Technology Limited; Mathematical Institute; University of Oxford; &amp; St Hilda's College, Oxford, United Kingdom"}]},{"given":"A. W.","family":"Roscoe","sequence":"additional","affiliation":[{"name":"The Blockhouse Technology Limited; University College Oxford Blockchain Research Centre; &amp; University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2015. Triton: A Dynamic Symbolic Execution Framework. SSTIC.  2015. Triton: A Dynamic Symbolic Execution Framework. SSTIC."},{"key":"e_1_3_2_2_2_1","volume-title":"Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. In Annual Computer Security Applications Conference","author":"Alder Fritz","year":"2020","unstructured":"Fritz Alder , Jo Van Bulck , David Oswald , and Frank Piessens . 2020 . Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. In Annual Computer Security Applications Conference ( Austin, USA) (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 415--427. Fritz Alder, Jo Van Bulck, David Oswald, and Frank Piessens. 2020. Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. In Annual Computer Security Applications Conference (Austin, USA) (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 415--427."},{"key":"e_1_3_2_2_3_1","unstructured":"Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'keeffe Mark L Stillwell etal 2016. {SCONE}: Secure linux containers with intel {SGX}. In 12th {USENIX}Symposium on Operating Systems Design and Implementation ({OSDI}. 689--703.  Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'keeffe Mark L Stillwell et al. 2016. {SCONE}: Secure linux containers with intel {SGX}. In 12th {USENIX}Symposium on Operating Systems Design and Implementation ({OSDI}. 689--703."},{"key":"e_1_3_2_2_4_1","first-page":"6","article-title":"Enhancing Symbolic Execution with","volume":"59","author":"Avgerinos Thanassis","year":"2016","unstructured":"Thanassis Avgerinos , Alexandre Rebert , Sang Kil Cha , and David Brumley . 2016 . Enhancing Symbolic Execution with Veritesting. Commun. ACM 59 , 6 (May 2016), 93--100. Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley. 2016. Enhancing Symbolic Execution with Veritesting. Commun. ACM 59, 6 (May 2016), 93--100.","journal-title":"Veritesting. Commun. ACM"},{"key":"e_1_3_2_2_5_1","volume-title":"International Symposium on Formal Methods for Components and Objects. Springer, 364--387","author":"Barnett Mike","year":"2005","unstructured":"Mike Barnett , Bor-Yuh Evan Chang , Robert DeLine , Bart Jacobs , and K Rustan M Leino . 2005 . Boogie: A modular reusable verifier for object-oriented programs . In International Symposium on Formal Methods for Components and Objects. Springer, 364--387 . Mike Barnett, Bor-Yuh Evan Chang, Robert DeLine, Bart Jacobs, and K Rustan M Leino. 2005. Boogie: A modular reusable verifier for object-oriented programs. In International Symposium on Formal Methods for Components and Objects. Springer, 364--387."},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . 2018 . The Guard's Dilemma: Efficient Code-Reuse Attacks against Intel SGX . In Proceedings of the 27th USENIX Conference on Security Symposium ( Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 1213--1227. Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard's Dilemma: Efficient Code-Reuse Attacks against Intel SGX. In Proceedings of the 27th USENIX Conference on Security Symposium (Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 1213--1227."},{"key":"e_1_3_2_2_7_1","volume-title":"Schwartz","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J . Schwartz . 2011 . BAP : A Binary Analysis Platform. In Computer Aided Verification, Ganesh Gopalakrishnan and Shaz Qadeer (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 463--469. David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Computer Aided Verification, Ganesh Gopalakrishnan and Shaz Qadeer (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 463--469."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation ( San Diego, California) (OSDI'08). USENIX Association, USA, 209--224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (San Diego, California) (OSDI'08). USENIX Association, USA, 209--224."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_2_10_1","volume-title":"2011 33rd International Conference on Software Engineering (ICSE). 1066--1071","author":"Cadar C.","unstructured":"C. Cadar , P. Godefroid , S. Khurshid , C. S. Pasareanu , K. Sen , N. Tillmann , and W. Visser . 2011. Symbolic execution for software testing in practice: preliminary assessment . In 2011 33rd International Conference on Software Engineering (ICSE). 1066--1071 . C. Cadar, P. Godefroid, S. Khurshid, C. S. Pasareanu, K. Sen, N. Tillmann, and W. Visser. 2011. Symbolic execution for software testing in practice: preliminary assessment. In 2011 33rd International Conference on Software Engineering (ICSE). 1066--1071."},{"key":"e_1_3_2_2_11_1","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS P). 142--157","author":"Chen G.","unstructured":"G. Chen , S. Chen , Y. Xiao , Y. Zhang , Z. Lin , and T. H. Lai . 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution . In 2019 IEEE European Symposium on Security and Privacy (EuroS P). 142--157 . G. Chen, S. Chen, Y. Xiao, Y. Zhang, Z. Lin, and T. H. Lai. 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. In 2019 IEEE European Symposium on Security and Privacy (EuroS P). 142--157."},{"key":"e_1_3_2_2_12_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Chen Zitai","unstructured":"Zitai Chen , Georgios Vasilakis , Kit Murdock , Edward Dean , David Oswald , and Flavio D. Garcia . 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, Vancouver, B.C. Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D. Garcia. 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Vancouver, B.C."},{"key":"e_1_3_2_2_13_1","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS P). 185--200","author":"Cheng R.","unstructured":"R. Cheng , F. Zhang , J. Kos , W. He , N. Hynes , N. Johnson , A. Juels , A. Miller , and D. Song . 2019. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts . In 2019 IEEE European Symposium on Security and Privacy (EuroS P). 185--200 . R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. 2019. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS P). 185--200."},{"key":"e_1_3_2_2_14_1","volume-title":"TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Cloosters Tobias","year":"2020","unstructured":"Tobias Cloosters , Michael Rodler , and Lucas Davi . 2020 . TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 841--858. Tobias Cloosters, Michael Rodler, and Lucas Davi. 2020. TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 841--858."},{"key":"e_1_3_2_2_15_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptol. ePrint Arch. 2016 , 86 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1--118.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_16_1","volume-title":"Bren- dan Saltaformaggio, and Wenke Lee","author":"Duan Ruian","year":"2019","unstructured":"Ruian Duan , Ashish Bijlani , Yang Ji , Omar Alrawi , Yiyuan Xiong , Moses Ike , Bren- dan Saltaformaggio, and Wenke Lee . 2019 . Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.. In NDSS. Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Bren- dan Saltaformaggio, and Wenke Lee. 2019. Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.. In NDSS."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_2_19_1","volume-title":"System Programming Guide, Part 4","author":"Intel Corporation 2020. Intel(R) 64 and IA-32 Architectures Software Developer's Manual Volume 3D","unstructured":"Intel Corporation 2020. Intel(R) 64 and IA-32 Architectures Software Developer's Manual Volume 3D : System Programming Guide, Part 4 . Intel Corporation . Available at: https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/ en\/documents-tps\/332831-sdm-vol-3d.pdf. Intel Corporation 2020. Intel(R) 64 and IA-32 Architectures Software Developer's Manual Volume 3D: System Programming Guide, Part 4. Intel Corporation. Available at: https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/ en\/documents-tps\/332831-sdm-vol-3d.pdf."},{"key":"e_1_3_2_2_20_1","unstructured":"Intel Corporation 2020. Intel(R) Software Guard Extensions Developer Guide. Intel Corporation. Available at: https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.12\/ docs\/Intel_SGX_Developer_Guide.pdf.  Intel Corporation 2020. Intel(R) Software Guard Extensions Developer Guide. Intel Corporation. Available at: https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.12\/ docs\/Intel_SGX_Developer_Guide.pdf."},{"key":"e_1_3_2_2_21_1","unstructured":"Intel Corporation 2020. Intel(R) Software Guard Extensions Developer Reference for Linux* OS. Intel Corporation. Available at: https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.12\/docs\/Intel_SGX_Developer_ Reference_Linux_2.12_Open_Source.pdf.  Intel Corporation 2020. Intel(R) Software Guard Extensions Developer Reference for Linux* OS. Intel Corporation. Available at: https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.12\/docs\/Intel_SGX_Developer_ Reference_Linux_2.12_Open_Source.pdf."},{"key":"e_1_3_2_2_22_1","unstructured":"Intel Corporation 2020. Intel(R) Software Guard Extensions for Linux* OS Reposi- tory. Intel Corporation. Available at: https:\/\/github.com\/intel\/linux-sgx.  Intel Corporation 2020. Intel(R) Software Guard Extensions for Linux* OS Reposi- tory. Intel Corporation. Available at: https:\/\/github.com\/intel\/linux-sgx."},{"key":"e_1_3_2_2_23_1","volume-title":"Demo program for the GNU Multiple Precision Arithmetic Library for Intel(R) Software Guard Extensions","author":"Intel Corporation 2021.","unstructured":"Intel Corporation 2021. Demo program for the GNU Multiple Precision Arithmetic Library for Intel(R) Software Guard Extensions . Intel Corporation . Available at: https:\/\/github.com\/intel\/sgx-gmp-demo\/tree\/ 85cd0409175d7b87160f6966c79a1be08d6b0aac. Intel Corporation 2021. Demo program for the GNU Multiple Precision Arithmetic Library for Intel(R) Software Guard Extensions. Intel Corporation. Available at: https:\/\/github.com\/intel\/sgx-gmp-demo\/tree\/ 85cd0409175d7b87160f6966c79a1be08d6b0aac."},{"key":"e_1_3_2_2_24_1","unstructured":"Intel Corporation 2021. Intel(R) Architectural Enclaves Code. Intel Corporation. Available at: https:\/\/github.com\/intel\/linux-sgx\/tree\/sgx_2.12\/psw\/ae.  Intel Corporation 2021. Intel(R) Architectural Enclaves Code. Intel Corporation. Available at: https:\/\/github.com\/intel\/linux-sgx\/tree\/sgx_2.12\/psw\/ae."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium","author":"Lee Jaehyuk","year":"2017","unstructured":"Jaehyuk Lee , Jinsoo Jang , Yeongjin Jang , Nohyun Kwak , Yeseul Choi , Changho Choi , Taesoo Kim , Marcus Peinado , and Brent Byunghoon Kang . 2017 . Hacking in Darkness: Return-Oriented Programming against Secure Enclaves . In Proceedings of the 26th USENIX Conference on Security Symposium ( Vancouver, BC, Canada) (SEC'17). USENIX Association, USA, 523--539. Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent Byunghoon Kang. 2017. Hacking in Darkness: Return-Oriented Programming against Secure Enclaves. In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) (SEC'17). USENIX Association, USA, 523--539."},{"key":"e_1_3_2_2_29_1","volume-title":"This is boogie 2. manuscript KRML 178, 131","author":"Leino K Rustan M","year":"2008","unstructured":"K Rustan M Leino . 2008. This is boogie 2. manuscript KRML 178, 131 ( 2008 ), 9. K Rustan M Leino. 2008. This is boogie 2. manuscript KRML 178, 131 (2008), 9."},{"key":"e_1_3_2_2_30_1","volume-title":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN). 108--114","author":"Lindner M.","unstructured":"M. Lindner , J. Aparicius , and P. Lindgren . 2018. No Panic! Verification of Rust Programs by Symbolic Execution . In 2018 IEEE 16th International Conference on Industrial Informatics (INDIN). 108--114 . M. Lindner, J. Aparicius, and P. Lindgren. 2018. No Panic! Verification of Rust Programs by Symbolic Execution. In 2018 IEEE 16th International Conference on Industrial Informatics (INDIN). 108--114."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079763"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219662"},{"key":"e_1_3_2_2_37_1","unstructured":"Open Enclave Community 2020. Intel(R) Software Guard Extensions Developer Guide. Open Enclave Community. Available at: https:\/\/openenclave.io\/sdk\/.  Open Enclave Community 2020. Intel(R) Software Guard Extensions Developer Guide. Open Enclave Community. Available at: https:\/\/openenclave.io\/sdk\/."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0122-2"},{"key":"e_1_3_2_2_39_1","volume-title":"Article 130 (Jan.","author":"Pinto Sandro","year":"2019","unstructured":"Sandro Pinto and Nuno Santos . 2019. Demystifying Arm TrustZone: A Comprehensive Survey. ACM Comput. Surv. 51, 6 , Article 130 (Jan. 2019 ), 36 pages. Sandro Pinto and Nuno Santos. 2019. Demystifying Arm TrustZone: A Comprehensive Survey. ACM Comput. Surv. 51, 6, Article 130 (Jan. 2019), 36 pages."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Hany Ragab Alyssa Milburn Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2021. CrossTalk: Speculative Data Leaks Across Cores Are Real. Vol. 2021-May. Institute of Electrical and Electronics Engineers Inc. United States.  Hany Ragab Alyssa Milburn Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2021. CrossTalk: Speculative Data Leaks Across Cores Are Real. Vol. 2021-May. Institute of Electrical and Electronics Engineers Inc. United States.","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_2_42_1","volume-title":"26th {USENIX}Security Symposium ({USENIX}Security 17). 781--798.","author":"Redini Nilo","unstructured":"Nilo Redini , Aravind Machiry , Dipanjan Das , Yanick Fratantonio , Antonio Bianchi , Eric Gustafson , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2017. Bootstomp: on the security of bootloaders in mobile devices . In 26th {USENIX}Security Symposium ({USENIX}Security 17). 781--798. Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2017. Bootstomp: on the security of bootloaders in mobile devices. In 26th {USENIX}Security Symposium ({USENIX}Security 17). 781--798."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_2_44_1","volume-title":"2010 IEEE Symposium on Security and Privacy. 317--331","author":"Schwartz E. J.","unstructured":"E. J. Schwartz , T. Avgerinos , and D. Brumley . 2010. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) . In 2010 IEEE Symposium on Security and Privacy. 317--331 . E. J. Schwartz, T. Avgerinos, and D. Brumley. 2010. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In 2010 IEEE Symposium on Security and Privacy. 317--331."},{"key":"e_1_3_2_2_45_1","volume-title":"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Seo Jaebaek","year":"2017","unstructured":"Jaebaek Seo , Byoungyoung Lee , Seong Min Kim , Ming-Wei Shih , Insik Shin , Dongsu Han , and Taesoo Kim . 2017 . SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017 , San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society."},{"key":"e_1_3_2_2_46_1","volume-title":"Address Sanitizer: A Fast Address Sanity Checker (USENIX ATC'12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitry Vyukov . 2012 . Address Sanitizer: A Fast Address Sanity Checker (USENIX ATC'12) . USENIX Association , USA , 28. Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. Address Sanitizer: A Fast Address Sanity Checker (USENIX ATC'12). USENIX Association, USA, 28."},{"key":"e_1_3_2_2_47_1","unstructured":"AMD SEV-SNP. 2020. Strengthening VM isolation with integrity protection and more. (2020).  AMD SEV-SNP. 2020. Strengthening VM isolation with integrity protection and more. (2020)."},{"key":"e_1_3_2_2_48_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). 138--157","author":"Shoshitaishvili Y.","unstructured":"Y. Shoshitaishvili , R. Wang , C. Salls , N. Stephens , M. Polino , A. Dutcher , J. Grosen , S. Feng , C. Hauser , C. Kruegel , and G. Vigna . 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis . In 2016 IEEE Symposium on Security and Privacy (SP). 138--157 . Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna. 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In 2016 IEEE Symposium on Security and Privacy (SP). 138--157."},{"key":"e_1_3_2_2_49_1","unstructured":"Signal developers 2021. Signal app private contact discovery micro-service. Signal developers. Available at: https:\/\/github.com\/signalapp\/ContactDiscoveryService\/ tree\/a6a0c1505003865f5f99497caf59f6d31cebf660.  Signal developers 2021. Signal app private contact discovery micro-service. Signal developers. Available at: https:\/\/github.com\/signalapp\/ContactDiscoveryService\/ tree\/a6a0c1505003865f5f99497caf59f6d31cebf660."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908113"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_3_2_2_52_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Subramanyan Pramod","unstructured":"Pramod Subramanyan , Rohit Sinha , Ilia Lebedev , Srinivas Devadas , and Sanjit A. Seshia . 2017. A Formal Foundation for Secure Remote Execution of Enclaves . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ( Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 2435--2450. Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, and Sanjit A. Seshia. 2017. A Formal Foundation for Secure Remote Execution of Enclaves. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 2435--2450."},{"key":"e_1_3_2_2_53_1","unstructured":"teaclave developers 2021. teaclave-sgx-sdk sample enclaves repository. teaclave developers. Available at: https:\/\/github.com\/apache\/incubator-teaclave-sgx-sdk\/tree\/v1.1.3\/samplecode.  teaclave developers 2021. teaclave-sgx-sdk sample enclaves repository. teaclave developers. Available at: https:\/\/github.com\/apache\/incubator-teaclave-sgx-sdk\/tree\/v1.1.3\/samplecode."},{"key":"e_1_3_2_2_54_1","unstructured":"TeeRex authors 2021. TeeRex binaries repository. TeeRex authors. Available at: https:\/\/github.com\/uni-due-syssec\/teerex-exploits\/tree\/60604e574ea4bf5a319c2713efe6864aa6864e1c.  TeeRex authors 2021. TeeRex binaries repository. TeeRex authors. Available at: https:\/\/github.com\/uni-due-syssec\/teerex-exploits\/tree\/60604e574ea4bf5a319c2713efe6864aa6864e1c."},{"key":"e_1_3_2_2_55_1","volume-title":"Foreshadow: Extracting the keys to the intel {SGX }kingdom with transient out-of-order execution. In 27th {USENIX}Security Symposium ({USENIX} Security 18). 991--1008.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the keys to the intel {SGX }kingdom with transient out-of-order execution. In 27th {USENIX}Security Symposium ({USENIX} Security 18). 991--1008. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel {SGX }kingdom with transient out-of-order execution. In 27th {USENIX}Security Symposium ({USENIX} Security 18). 991--1008."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_2_59_1","unstructured":"Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX Fails in Practice. https:\/\/sgaxeattack.com\/.  Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX Fails in Practice. https:\/\/sgaxeattack.com\/."},{"key":"e_1_3_2_2_60_1","volume-title":"RIDL: Rogue In-flight Data Load. In S&P.","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2019 . RIDL: Rogue In-flight Data Load. In S&P. Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-flight Data Load. In S&P."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354241"},{"key":"e_1_3_2_2_62_1","unstructured":"Wolfssl developers [n.d.]. Wolfssl SGX enclave example. Wolfssl devel- opers. Available at: https:\/\/github.com\/wolfSSL\/wolfssl-examples\/tree\/ e98762b110d5614a9faa0942a9f98b66350ee299\/SGX_Linux.  Wolfssl developers [n.d.]. Wolfssl SGX enclave example. Wolfssl devel- opers. Available at: https:\/\/github.com\/wolfSSL\/wolfssl-examples\/tree\/ e98762b110d5614a9faa0942a9f98b66350ee299\/SGX_Linux."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417243"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474123.3486755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:35Z","timestamp":1750191455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486755"}},"subtitle":["Symbolic Validation of Orderliness in SGX Enclaves"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":63,"alternative-id":["10.1145\/3474123.3486755","10.1145\/3474123"],"URL":"https:\/\/doi.org\/10.1145\/3474123.3486755","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}