{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:40:34Z","timestamp":1773931234043,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":103,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scotiabank"},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba"},{"DOI":"10.13039\/100016746","name":"Futurewei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016746","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008536","name":"Amazon Web Services","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008536","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Splunk"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1730628, 194337"],"award-info":[{"award-number":["CCF-1730628, 194337"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007065","name":"Nvidia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bakar Fellows"},{"DOI":"10.13039\/501100018772","name":"Ant Financial Services Group","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018772","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ericsson"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3477132.3483562","type":"proceedings-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T15:59:18Z","timestamp":1634659158000},"page":"655-671","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Snoopy"],"prefix":"10.1145","author":[{"given":"Emma","family":"Dauterman","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"Vivian","family":"Fang","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Ioannis","family":"Demertzis","sequence":"additional","affiliation":[{"name":"UC Berkeley and UC Santa Cruz"}]},{"given":"Natacha","family":"Crooks","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Snoopy repository. https:\/\/github.com\/ucbrise\/snoopy.  Snoopy repository. https:\/\/github.com\/ucbrise\/snoopy."},{"key":"e_1_3_2_1_2_1","unstructured":"Trillian. https:\/\/github.com\/google\/trillian.  Trillian. https:\/\/github.com\/google\/trillian."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23284"},{"key":"e_1_3_2_1_4_1","volume-title":"OSDI. USENIX","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath Setty . Unobservable communication over fully untrusted infrastructure . In OSDI. USENIX , 2016 . Sebastian Angel and Srinath Setty. Unobservable communication over fully untrusted infrastructure. In OSDI. USENIX, 2016."},{"key":"e_1_3_2_1_5_1","unstructured":"Attestation Service for Intel SGX. https:\/\/api.trustedservices.intel.com\/documents\/sgx-attestation-api-spec.pdf.  Attestation Service for Intel SGX. https:\/\/api.trustedservices.intel.com\/documents\/sgx-attestation-api-spec.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335411"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_1_12_1","volume-title":"WOOT. USENIX","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . Software grand exposure: SGX cache attacks are practical . In WOOT. USENIX , 2017 . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. Software grand exposure: SGX cache attacks are practical. In WOOT. USENIX, 2017."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23411"},{"key":"e_1_3_2_1_15_1","volume-title":"ASIACRYPT. IACR","author":"Hubert Chan T-H","year":"2017","unstructured":"T-H Hubert Chan , Kai-Min Chung , and Elaine Shi . On the depth of oblivious parallel ram . In ASIACRYPT. IACR , 2017 . T-H Hubert Chan, Kai-Min Chung, and Elaine Shi. On the depth of oblivious parallel ram. In ASIACRYPT. IACR, 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"Oblivious hashing revisited, and applications to asymptotically efficient oram and opram","author":"Hubert Chan T-H","year":"2017","unstructured":"T-H Hubert Chan , Yue Guo , Wei-Kai Lin , and Elaine Shi . Oblivious hashing revisited, and applications to asymptotically efficient oram and opram . In ASIACRYPT. Springer , IACR , 2017 . T-H Hubert Chan, Yue Guo, Wei-Kai Lin, and Elaine Shi. Oblivious hashing revisited, and applications to asymptotically efficient oram and opram. In ASIACRYPT. Springer, IACR, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"TCC. IACR","author":"Hubert Chan T-H","year":"2017","unstructured":"T-H Hubert Chan and Elaine Shi . Circuit OPRAM : Unifying statistically and computationally secure ORAMs and OPRAMs . In TCC. IACR , 2017 . T-H Hubert Chan and Elaine Shi. Circuit OPRAM: Unifying statistically and computationally secure ORAMs and OPRAMs. In TCC. IACR, 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium","author":"Chen Zitai","year":"2021","unstructured":"Zitai Chen , Georgios Vasilakis , Kit Murdock , Edward Dean , David Oswald , and Flavio D Garcia . VoltPillager : Hardware-based fault injection attacks against intel SGX enclaves using the SVID voltage scaling interface . In USENIX Security Symposium , 2021 . Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D Garcia. VoltPillager: Hardware-based fault injection attacks against intel SGX enclaves using the SVID voltage scaling interface. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_21_1","volume-title":"Private information retrieval","author":"Chor Benny","year":"1995","unstructured":"Benny Chor , Oded Goldreich , Eyal Kushilevitz , and Madhu Sudan . Private information retrieval . In FOCS. IEEE , 1995 . Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In FOCS. IEEE, 1995."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_23_1","volume-title":"David J Jeffrey, and Donald E Knuth. On the Lambert W function. Advances in Computational mathematics","author":"Corless Robert M","year":"1996","unstructured":"Robert M Corless , Gaston H Gonnet , David EG Hare , David J Jeffrey, and Donald E Knuth. On the Lambert W function. Advances in Computational mathematics , 1996 . Robert M Corless, Gaston H Gonnet, David EG Hare, David J Jeffrey, and Donald E Knuth. On the Lambert W function. Advances in Computational mathematics, 1996."},{"key":"e_1_3_2_1_24_1","volume-title":"The pyramid scheme: Oblivious RAM for trusted processors. arXiv preprint arXiv:1712.07882","author":"Costa Manuel","year":"2017","unstructured":"Manuel Costa , Lawrence Esswood , Olga Ohrimenko , Felix Schuster , and Sameer Wagh . The pyramid scheme: Oblivious RAM for trusted processors. arXiv preprint arXiv:1712.07882 , 2017 . Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, and Sameer Wagh. The pyramid scheme: Oblivious RAM for trusted processors. arXiv preprint arXiv:1712.07882, 2017."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . Sanctum : Minimal hardware extensions for strong software isolation . In USENIX Security Symposium , 2016 . Victor Costan, Ilia Lebedev, and Srinivas Devadas. Sanctum: Minimal hardware extensions for strong software isolation. In USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_26_1","volume-title":"OSDI. USENIX","author":"Crooks Natacha","year":"2018","unstructured":"Natacha Crooks , Matthew Burke , Ethan Cecchetti , Sitar Harel , Rachit Agarwal , and Lorenzo Alvisi . Obladi : Oblivious serializable transactions in the cloud . In OSDI. USENIX , 2018 . Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, and Lorenzo Alvisi. Obladi: Oblivious serializable transactions in the cloud. In OSDI. USENIX, 2018."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"e_1_3_2_1_28_1","volume-title":"OSDI. USENIX","author":"Dauterman Emma","year":"2020","unstructured":"Emma Dauterman , Eric Feng , Ellen Luo , Raluca Ada Popa , and Ion Stoica . DORY : An encrypted search system with distributed trust . In OSDI. USENIX , 2020 . Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica. DORY: An encrypted search system with distributed trust. In OSDI. USENIX, 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . { SEAL } : Attack mitigation for encrypted databases via adjustable leakage . In USENIX Security Symposium , 2020 . Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. {SEAL }: Attack mitigation for encrypted databases via adjustable leakage. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133967"},{"key":"e_1_3_2_1_31_1","volume-title":"VLDB","author":"Eskandarian Saba","year":"2019","unstructured":"Saba Eskandarian and Matei Zaharia . ObliDB : oblivious query processing for secure databases . VLDB , 2019 . Saba Eskandarian and Matei Zaharia. ObliDB: oblivious query processing for secure databases. VLDB, 2019."},{"key":"e_1_3_2_1_32_1","unstructured":"5\n    advantages of a cloud-based EHR. https:\/\/www.carecloud.com\/continuum\/5-advantages-of-a-cloud-based-ehr-for-large-practices\/.  5 advantages of a cloud-based EHR. https:\/\/www.carecloud.com\/continuum\/5-advantages-of-a-cloud-based-ehr-for-large-practices\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Emil Stefanov, Dimitrios Serpanos, and Srinivas Devadas. A low-latency, low-area hardware oblivious RAM controller","author":"Fletcher Christopher W","year":"2015","unstructured":"Christopher W Fletcher , Ling Ren , Albert Kwon , Marten Van Dijk , Emil Stefanov, Dimitrios Serpanos, and Srinivas Devadas. A low-latency, low-area hardware oblivious RAM controller . In FCCM. IEEE , 2015 . Christopher W Fletcher, Ling Ren, Albert Kwon, Marten Van Dijk, Emil Stefanov, Dimitrios Serpanos, and Srinivas Devadas. A low-latency, low-area hardware oblivious RAM controller. In FCCM. IEEE, 2015."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989555"},{"key":"e_1_3_2_1_36_1","unstructured":"Google. Key transparency design doc. https:\/\/github.com\/google\/keytransparency\/blob\/master\/docs\/design_new.md.  Google. Key transparency design doc. https:\/\/github.com\/google\/keytransparency\/blob\/master\/docs\/design_new.md."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium","author":"Grubbs Paul","year":"2020","unstructured":"Paul Grubbs , Anurag Khandelwal , Marie-Sarah Lacharit\u00e9 , Lloyd Brown , Lucy Li , Rachit Agarwal , and Thomas Ristenpart . Pancake : Frequency smoothing for encrypted data stores . In USENIX Security Symposium , 2020 . Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharit\u00e9, Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. Pancake: Frequency smoothing for encrypted data stores. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_38_1","volume-title":"Security & Privacy","author":"Grubbs Paul","year":"2019","unstructured":"Paul Grubbs , Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G Paterson . Learning to reconstruct: Statistical learning theory and encrypted database attacks . In Security & Privacy . IEEE , 2019 . Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G Paterson. Learning to reconstruct: Statistical learning theory and encrypted database attacks. In Security & Privacy. IEEE, 2019."},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX Security Symposium","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olya Ohrimenko , Istvan Haller , and Manuel Costa . Strong and efficient cache side-channel protection using hardware transactional memory . In USENIX Security Symposium , 2017 . Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. Strong and efficient cache side-channel protection using hardware transactional memory. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_40_1","volume-title":"Security & Privacy","author":"Gruss Daniel","year":"2018","unstructured":"Daniel Gruss , Moritz Lipp , Michael Schwarz , Daniel Genkin , Jonas Juffinger , Sioli O'Connell , Wolfgang Schoechl , and Yuval Yarom . Another flip in the wall of rowhammer defenses . In Security & Privacy . IEEE , 2018 . Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, and Yuval Yarom. Another flip in the wall of rowhammer defenses. In Security & Privacy. IEEE, 2018."},{"key":"e_1_3_2_1_41_1","volume-title":"NSDI. USENIX","author":"Gupta Trinabh","year":"2016","unstructured":"Trinabh Gupta , Natacha Crooks , Whitney Mulhern , Srinath Setty , Lorenzo Alvisi , and Michael Walfish . Scalable and private media consumption with popcorn . In NSDI. USENIX , 2016 . Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. Scalable and private media consumption with popcorn. In NSDI. USENIX, 2016."},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX ATC","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . High-resolution side channels for untrusted operating systems . In USENIX ATC , 2017 . Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. High-resolution side channels for untrusted operating systems. In USENIX ATC, 2017."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0036"},{"key":"e_1_3_2_1_44_1","volume-title":"TOPLAS","author":"Herlihy Maurice P","year":"1990","unstructured":"Maurice P Herlihy and Jeannette M Wing . Linearizability : A correctness condition for concurrent objects . TOPLAS , 1990 . Maurice P Herlihy and Jeannette M Wing. Linearizability: A correctness condition for concurrent objects. TOPLAS, 1990."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375749"},{"key":"e_1_3_2_1_46_1","volume-title":"PETS","author":"Hoang Thang","year":"2019","unstructured":"Thang Hoang , Muslum Ozgur Ozmen , Yeongjin Jang , and Attila A Yavuz . Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset . PETS , 2019 . Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, and Attila A Yavuz. Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset. PETS, 2019."},{"key":"e_1_3_2_1_47_1","unstructured":"Intel. Intel xeon scalable platform built for most sensitive workloads. https:\/\/www.intel.com\/content\/www\/us\/en\/newsroom\/news\/xeon-scalable-platform-built-sensitive-workloads.html.  Intel. Intel xeon scalable platform built for most sensitive workloads. https:\/\/www.intel.com\/content\/www\/us\/en\/newsroom\/news\/xeon-scalable-platform-built-sensitive-workloads.html."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007396"},{"key":"e_1_3_2_1_49_1","volume-title":"NDSS. Citeseer","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . Access pattern disclosure on searchable encryption: ramification, attack and mitigation . In NDSS. Citeseer , 2012 . Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In NDSS. Citeseer, 2012."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium","author":"Kogan Dmitry","year":"2021","unstructured":"Dmitry Kogan and Henry Corrigan-Gibbs . Private blocklist lookups with checklist . In USENIX Security Symposium , 2021 . Dmitry Kogan and Henry Corrigan-Gibbs. Private blocklist lookups with checklist. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_3_2_1_54_1","volume-title":"Opportunities and challenges of cloud computing to improve health care services. Journal of medical Internet research","author":"Kuo Mu-Hsing","year":"2011","unstructured":"Mu-Hsing Kuo . Opportunities and challenges of cloud computing to improve health care services. Journal of medical Internet research , 2011 . Mu-Hsing Kuo. Opportunities and challenges of cloud computing to improve health care services. Journal of medical Internet research, 2011."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.13"},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX Security Symposium","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee , Dongha Jung , Ian T Fang , Chia-Che Tsai , and Raluca Ada Popa . An off-chip attack on hardware enclaves via the memory bus . In USENIX Security Symposium , 2020 . Dayeol Lee, Dongha Jung, Ian T Fang, Chia-Che Tsai, and Raluca Ada Popa. An off-chip attack on hardware enclaves via the memory bus. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_58_1","volume-title":"USENIX Security Symposium","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In USENIX Security Symposium , 2017 . Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_60_1","volume-title":"FAST","author":"Lorch Jacob R","year":"2013","unstructured":"Jacob R Lorch , Bryan Parno , James Mickens , Mariana Raykova , and Joshua Schiffman . Shroud : Ensuring private access to large-scale data in the data center . In FAST , 2013 . Jacob R Lorch, Bryan Parno, James Mickens, Mariana Raykova, and Joshua Schiffman. Shroud: Ensuring private access to large-scale data in the data center. In FAST, 2013."},{"key":"e_1_3_2_1_61_1","volume-title":"January","author":"Marlinspike Moxie","year":"2014","unstructured":"Moxie Marlinspike . The difficulty of private contact discovery , January 2014 . https:\/\/signal.org\/blog\/contact-discovery\/. Moxie Marlinspike. The difficulty of private contact discovery, January 2014. https:\/\/signal.org\/blog\/contact-discovery\/."},{"key":"e_1_3_2_1_62_1","volume-title":"USENIX Security Symposium","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . ROTE : Rollback protection for trusted execution . In USENIX Security Symposium , 2017 . Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. ROTE: Rollback protection for trusted execution. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_63_1","first-page":"783","volume-title":"USENIX Security Symposium","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic , Karl W\u00fcst , Moritz Schneider , Kari Kostiainen , Ghassan Karame , and Srdjan Capkun . BITE : Bitcoin lightweight client privacy using trusted execution . In USENIX Security Symposium , pages 783 -- 800 , 2019 . Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. BITE: Bitcoin lightweight client privacy using trusted execution. In USENIX Security Symposium, pages 783--800, 2019."},{"key":"e_1_3_2_1_64_1","volume-title":"USENIX Security Symposium","author":"Melara Marcela S","year":"2015","unstructured":"Marcela S Melara , Joseph Blankstein , Aaron aind Bonneau , Edward W Felten , and Michael J Freedman . CONIKS : Bringing key transparency to end users . In USENIX Security Symposium , 2015 . Marcela S Melara, Joseph Blankstein, Aaron aind Bonneau, Edward W Felten, and Michael J Freedman. CONIKS: Bringing key transparency to end users. In USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_65_1","unstructured":"Memtier benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark.  Memtier benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark."},{"key":"e_1_3_2_1_66_1","volume-title":"Security & Privacy","author":"Mishra Pratyush","year":"2018","unstructured":"Pratyush Mishra , Rishabh Poddar , Jerry Chen , Alessandro Chiesa , and Raluca Ada Popa . Oblix: An efficient oblivious search index . In Security & Privacy . IEEE , 2018 . Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. Oblix: An efficient oblivious search index. In Security & Privacy. IEEE, 2018."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_69_1","volume-title":"Daniel Gruss, and Frank Piessens. Plundervolt: Software-based fault injection attacks against Intel SGX. In Security & Privacy","author":"Murdock Kit","year":"2020","unstructured":"Kit Murdock , David Oswald , Flavio D Garcia , Jo Van Bulck , Daniel Gruss, and Frank Piessens. Plundervolt: Software-based fault injection attacks against Intel SGX. In Security & Privacy . IEEE , 2020 . Kit Murdock, David Oswald, Flavio D Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. Plundervolt: Software-based fault injection attacks against Intel SGX. In Security & Privacy. IEEE, 2020."},{"key":"e_1_3_2_1_70_1","volume-title":"Succinct oblivious ram. arXiv preprint arXiv:1804.08285","author":"Onodera Taku","year":"2018","unstructured":"Taku Onodera and Tetsuo Shibuya . Succinct oblivious ram. arXiv preprint arXiv:1804.08285 , 2018 . Taku Onodera and Tetsuo Shibuya. Succinct oblivious ram. arXiv preprint arXiv:1804.08285, 2018."},{"key":"e_1_3_2_1_71_1","unstructured":"OpenEnclave. https:\/\/github.com\/openenclave\/openenclave.  OpenEnclave. https:\/\/github.com\/openenclave\/openenclave."},{"key":"e_1_3_2_1_72_1","volume-title":"EuroSys. ACM","author":"Orenbach Meni","year":"2017","unstructured":"Meni Orenbach , Pavel Lifshits , Marina Minkin , and Mark Silberstein . Eleos : Exitless os services for SGX enclaves . In EuroSys. ACM , 2017 . Meni Orenbach, Pavel Lifshits, Marina Minkin, and Mark Silberstein. Eleos: Exitless os services for SGX enclaves. In EuroSys. ACM, 2017."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"e_1_3_2_1_74_1","volume-title":"Security & Privacy","author":"Parno Bryan","year":"2011","unstructured":"Bryan Parno , Jacob R Lorch , John R Douceur , James Mickens , and Jonathan M McCune . Memoir: Practical state continuity for protected modules . In Security & Privacy . IEEE , 2011 . Bryan Parno, Jacob R Lorch, John R Douceur, James Mickens, and Jonathan M McCune. Memoir: Practical state continuity for protected modules. In Security & Privacy. IEEE, 2011."},{"key":"e_1_3_2_1_75_1","volume-title":"USENIX Security Symposium","author":"Poddar Rishabh","year":"2020","unstructured":"Rishabh Poddar , Ganesh Ananthanarayanan , Srinath Setty , Stavros Volos , and Raluca Ada Popa . Visor : Privacy-preserving video analytics as a cloud service . In USENIX Security Symposium , 2020 . Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, and Raluca Ada Popa. Visor: Privacy-preserving video analytics as a cloud service. In USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_76_1","volume-title":"NSDI. USENIX","author":"Poddar Rishabh","year":"2018","unstructured":"Rishabh Poddar , Chang Lan , Raluca Ada Popa , and Sylvia Ratnasamy . Safebricks : Shielding network functions in the cloud . In NSDI. USENIX , 2018 . Rishabh Poddar, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. Safebricks: Shielding network functions in the cloud. In NSDI. USENIX, 2018."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/646975.711521"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49543-6_13"},{"key":"e_1_3_2_1_79_1","volume-title":"Security & Privacy","author":"Ragab Hany","year":"2021","unstructured":"Hany Ragab , Alyssa Milburn , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . Crosstalk: Speculative data leaks across cores are real . In Security & Privacy . IEEE , 2021 . Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. Crosstalk: Speculative data leaks across cores are real. In Security & Privacy. IEEE, 2021."},{"key":"e_1_3_2_1_80_1","volume-title":"Data oblivious algorithms for multicores. arXiv preprint arXiv:2008.00332","author":"Ramachandran Vijaya","year":"2020","unstructured":"Vijaya Ramachandran and Elaine Shi . Data oblivious algorithms for multicores. arXiv preprint arXiv:2008.00332 , 2020 . Vijaya Ramachandran and Elaine Shi. Data oblivious algorithms for multicores. arXiv preprint arXiv:2008.00332, 2020."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610928708829574"},{"key":"e_1_3_2_1_82_1","unstructured":"Redis. https:\/\/redis.io\/.  Redis. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_83_1","volume-title":"USENIX Security Symposium","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten Van Dijk , and Srinivas Devadas . Constants count : Practical improvements to oblivious RAM . In USENIX Security Symposium , 2015 . Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, and Srinivas Devadas. Constants count: Practical improvements to oblivious RAM. In USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jda.2011.04.005"},{"key":"e_1_3_2_1_85_1","unstructured":"Ripple. https:\/\/ripple.com\/xrp\/.  Ripple. https:\/\/ripple.com\/xrp\/."},{"key":"e_1_3_2_1_86_1","volume-title":"Huijia Lin, and Stefano Tessaro. TaoStore: Overcoming asynchronicity in oblivious data storage. In Security & Privacy","author":"Sahin Cetin","year":"2016","unstructured":"Cetin Sahin , Victor Zakhary , Amr El Abbadi , Huijia Lin, and Stefano Tessaro. TaoStore: Overcoming asynchronicity in oblivious data storage. In Security & Privacy . IEEE , 2016 . Cetin Sahin, Victor Zakhary, Amr El Abbadi, Huijia Lin, and Stefano Tessaro. TaoStore: Overcoming asynchronicity in oblivious data storage. In Security & Privacy. IEEE, 2016."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_3_2_1_88_1","volume-title":"CCS. ACM","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz , Moritz Lipp , Daniel Moghimi , Jo Van Bulck , Julian Stecklina , Thomas Prescher , and Daniel Gruss . ZombieLoad : Cross-privilege-boundary data sampling . In CCS. ACM , 2019 . Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. In CCS. ACM, 2019."},{"key":"e_1_3_2_1_89_1","volume-title":"Malware guard extension: Using SGX to conceal cache attacks","author":"Schwarz Michael","year":"2017","unstructured":"Michael Schwarz , Samuel Weiser , Daniel Gruss , Cl\u00e9mentine Maurice , and Stefan Mangard . Malware guard extension: Using SGX to conceal cache attacks . In DIMVA. Springer , 2017 . Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. Malware guard extension: Using SGX to conceal cache attacks. In DIMVA. Springer, 2017."},{"key":"e_1_3_2_1_90_1","unstructured":"Mary Shacklett. Financial services companies are starting to use the cloud for big data and ai processing. https:\/\/www.techrepublic.com\/article\/financial-services-companies-are-starting-to-use-the-cloud-for-big-data-and-ai-processing\/ 2020.  Mary Shacklett. Financial services companies are starting to use the cloud for big data and ai processing. https:\/\/www.techrepublic.com\/article\/financial-services-companies-are-starting-to-use-the-cloud-for-big-data-and-ai-processing\/ 2020."},{"key":"e_1_3_2_1_91_1","unstructured":"Solana. Solana decentralized exchange. https:\/\/soldex.ai\/wp-content\/uploads\/2021\/07\/Soldex.ai-whitepaper-.pdf.  Solana. Solana decentralized exchange. https:\/\/soldex.ai\/wp-content\/uploads\/2021\/07\/Soldex.ai-whitepaper-.pdf."},{"key":"e_1_3_2_1_92_1","volume-title":"Security & Privacy","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov and Elaine Shi . ObliviStore: High performance oblivious cloud storage . In Security & Privacy . IEEE , 2013 . Emil Stefanov and Elaine Shi. ObliviStore: High performance oblivious cloud storage. In Security & Privacy. IEEE, 2013."},{"key":"e_1_3_2_1_93_1","volume-title":"NDSS","author":"Stefanov Emil","year":"2012","unstructured":"Emil Stefanov , Elaine Shi , and Dawn Song . Towards practical oblivious ram . In NDSS , 2012 . Emil Stefanov, Elaine Shi, and Dawn Song. Towards practical oblivious ram. In NDSS, 2012."},{"key":"e_1_3_2_1_94_1","volume-title":"CCS. ACM","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov , Marten Van Dijk , Elaine Shi , Christopher Fletcher , Ling Ren , Xiangyao Yu , and Srinivas Devadas . Path ORAM : an extremely simple oblivious RAM protocol . In CCS. ACM , 2013 . Emil Stefanov, Marten Van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. Path ORAM: an extremely simple oblivious RAM protocol. In CCS. ACM, 2013."},{"key":"e_1_3_2_1_95_1","volume-title":"USENIX Security Symposium","author":"Tang Adrian","year":"2017","unstructured":"Adrian Tang , Simha Sethumadhavan , and Salvatore Stolfo . CLKSCREW : exposing the perils of security-oblivious energy management . In USENIX Security Symposium , 2017 . Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. CLKSCREW: exposing the perils of security-oblivious energy management. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_96_1","volume-title":"RAID","author":"Tople Shruti","year":"2019","unstructured":"Shruti Tople , Yaoqi Jia , and Prateek Saxena . PRO-ORAM : Practical read-only oblivious RAM . In RAID , 2019 . Shruti Tople, Yaoqi Jia, and Prateek Saxena. PRO-ORAM: Practical read-only oblivious RAM. In RAID, 2019."},{"key":"e_1_3_2_1_97_1","volume-title":"USENIX Security Symposium","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . Foreshadow : Extracting the keys to the Intel SGX kingdom with transient out-of-order execution . In USENIX Security Symposium , 2018 . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In USENIX Security Symposium, 2018."},{"key":"e_1_3_2_1_98_1","volume-title":"Security & Privacy","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck , Daniel Moghimi , Michael Schwarz , Moritz Lipp , Marina Minkin , Daniel Genkin , Yarom Yuval , Berk Sunar , Daniel Gruss , and Frank Piessens . LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection . In Security & Privacy . IEEE , 2020 . Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Security & Privacy. IEEE, 2020."},{"key":"e_1_3_2_1_99_1","volume-title":"USENIX Security Symposium","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In USENIX Security Symposium , 2017 . Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_100_1","volume-title":"Security & Privacy","author":"Schaik Stephan Van","year":"2019","unstructured":"Stephan Van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . RIDL: Rogue in-flight data load . In Security & Privacy . IEEE , 2019 . Stephan Van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue in-flight data load. In Security & Privacy. IEEE, 2019."},{"key":"e_1_3_2_1_101_1","volume-title":"CacheOut: Leaking data on Intel CPUs via cache evictions. arXiv preprint arXiv:2006.13353","author":"van Schaik Stephan","year":"2020","unstructured":"Stephan van Schaik , Marina Minkin , Andrew Kwong , Daniel Genkin , and Yuval Yarom . CacheOut: Leaking data on Intel CPUs via cache evictions. arXiv preprint arXiv:2006.13353 , 2020 . Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, and Yuval Yarom. CacheOut: Leaking data on Intel CPUs via cache evictions. arXiv preprint arXiv:2006.13353, 2020."},{"key":"e_1_3_2_1_102_1","volume-title":"CCS. ACM","author":"Williams Peter","year":"2012","unstructured":"Peter Williams , Radu Sion , and Alin Tomescu . Privatefs : A parallel oblivious file system . In CCS. ACM , 2012 . Peter Williams, Radu Sion, and Alin Tomescu. Privatefs: A parallel oblivious file system. In CCS. ACM, 2012."},{"key":"e_1_3_2_1_103_1","volume-title":"Security & Privacy","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . Controlled-channel attacks: Deterministic side channels for untrusted operating systems . In Security & Privacy . IEEE , 2015 . Yuanzhong Xu, Weidong Cui, and Marcus Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Security & Privacy. IEEE, 2015."}],"event":{"name":"SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles","location":"Virtual Event Germany","acronym":"SOSP '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477132.3483562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477132.3483562","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477132.3483562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:15Z","timestamp":1750193355000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477132.3483562"}},"subtitle":["Surpassing the Scalability Bottleneck of Oblivious Storage"],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":103,"alternative-id":["10.1145\/3477132.3483562","10.1145\/3477132"],"URL":"https:\/\/doi.org\/10.1145\/3477132.3483562","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}