{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:24Z","timestamp":1775745324352,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T00:00:00Z","timestamp":1657411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB-1119"],"award-info":[{"award-number":["SFB-1119"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,10]]},"DOI":"10.1145\/3489517.3530436","type":"proceedings-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T23:19:29Z","timestamp":1661296769000},"page":"241-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["VirTEE"],"prefix":"10.1145","author":[{"given":"Jianqiang","family":"Wang","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t of Darmstadt"}]},{"given":"Pouya","family":"Mahmoody","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t of Darmstadt"}]},{"given":"Ferdinand","family":"Brasser","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t of Darmstadt"}]},{"given":"Patrick","family":"Jauernig","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t of Darmstadt"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t of Darmstadt"}]},{"given":"Donghui","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Dahan","family":"Pan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. EMBC. Coremark. https:\/\/www.eembc.org\/coremark\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Security technology: building a secure system using TrustZone technology. https:\/\/developer.arm.com\/-\/media\/Arm%20Developer%20Community\/PDF\/TrustZone-and-FIDO-white-paper.pdf?revision=98e6ae26-92ca-4ffd-ac4e-3329b7f8a23e."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. rv8-bench. https:\/\/github.com\/michaeljclark\/rv8-bench."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Side Channels and Runtime Encryption Solutions with Intel\u00ae SGX. https:\/\/www.fortanix.com\/assets\/Fortanix_Side_Channel_Whitepaper.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. RISC-V Secure Bootloader. https:\/\/riscv.org\/wp-content\/uploads\/2019\/06\/13.55-RISC-V-Workshop-Secure-Bootloader.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. Arm Confidential Compute Architecture. https:\/\/documentation-service.arm.com\/static\/61825631f45f0b1fbf3a7a7d?token=."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. GNU Binutils. https:\/\/www.gnu.org\/software\/binutils\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Intel\u00ae Software Guard Extensions. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Intel\u00ae Trust Domain Extensions. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/intel-tdx-module-1.5-base-spec-348549001.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. OpenSSL. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'keeffe Mark L Stillwell et al. 2016. {SCONE}: Secure linux containers with intel {SGX}. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 689--703."},{"key":"e_1_3_2_1_12_1","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Bahmani Raad","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. {CURE}: A Security Architecture with Customizable and Resilient Enclaves. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_14_1","volume-title":"SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS.","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251223"},{"key":"e_1_3_2_1_17_1","volume-title":"Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857--874.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857--874."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_26"},{"key":"e_1_3_2_1_19_1","volume-title":"Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Feng Erhu","year":"2021","unstructured":"Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 275--294. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/feng"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.37"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101874"},{"key":"e_1_3_2_1_23_1","unstructured":"Richard D Hipp. 2020. SQLite."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378486"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_26_1","unstructured":"Ingo L\u00fctkebohle. 2016. AMD Secure Encrypted Virtualization. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.008"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2016.23"},{"key":"e_1_3_2_1_29_1","volume-title":"SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143 (2019)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_31_1","volume-title":"Shruti Tople, and Prateek Saxena.","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS."},{"key":"e_1_3_2_1_32_1","volume-title":"Graphene-sgx: A practical library {OS} for unmodified applications on {SGX}. In 2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17). 645--658.","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-sgx: A practical library {OS} for unmodified applications on {SGX}. In 2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17). 645--658."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665741"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"}],"event":{"name":"DAC '22: 59th ACM\/IEEE Design Automation Conference","location":"San Francisco California","acronym":"DAC '22","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA"]},"container-title":["Proceedings of the 59th ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489517.3530436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3489517.3530436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:39Z","timestamp":1750191519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489517.3530436"}},"subtitle":["a full backward-compatible TEE with native live migration and secure I\/O"],"short-title":[],"issued":{"date-parts":[[2022,7,10]]},"references-count":34,"alternative-id":["10.1145\/3489517.3530436","10.1145\/3489517"],"URL":"https:\/\/doi.org\/10.1145\/3489517.3530436","relation":{},"subject":[],"published":{"date-parts":[[2022,7,10]]},"assertion":[{"value":"2022-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}