{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:59Z","timestamp":1774448999204,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507733","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"1070-1085","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["ShEF: shielded enclaves for cloud FPGAs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0706-5208","authenticated-orcid":false,"given":"Mark","family":"Zhao","sequence":"first","affiliation":[{"name":"Stanford University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8433-7281","authenticated-orcid":false,"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Christos","family":"Kozyrakis","sequence":"additional","affiliation":[{"name":"Stanford University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Affine Transformation. https:\/\/github.com\/Xilinx\/SDAccel_Examples\/tree\/master\/vision\/affine"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Amazon EC2 F1 Instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/f1"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. AWS EC2 FPGA Development Kit. https:\/\/github.com\/aws\/aws-fpga"},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. AWS Marketplace. https:\/\/aws.amazon.com\/marketplace\/search\/results?x=0&y=0&searchTerms=fpga"},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Capital One Data Breach Compromises Data of Over 100 Million. https:\/\/www.nytimes.com\/2019\/07\/29\/business\/capital-one-data-breach-hacked.html"},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. CNN Convolution Example. https:\/\/github.com\/Xilinx\/SDAccel_Examples\/tree\/master\/getting_started\/clk_freq\/large_loop_ocl"},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. Deneb Genetics. http:\/\/www.denebgenetics.com\/"},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. Deploy a model as a web service on an FPGA with Azure Machine Learning service. https:\/\/docs.microsoft.com\/en-us\/azure\/machine-learning\/service\/how-to-deploy-fpga-web-service"},{"key":"e_1_3_2_1_9_1","unstructured":"[n. d.]. Equifax Data Breach. https:\/\/epic.org\/privacy\/data-breach\/equifax\/"},{"key":"e_1_3_2_1_10_1","unstructured":"[n. d.]. F1 Acceleration for Montecarlo Financial Algorithms of FPGAs. https:\/\/www.xilinx.com\/publications\/events\/developer-forum\/2018-frankfurt\/f1-acceleration-for-montecarlo-financial-algorithms-on-fpga.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"[n. d.]. FPGA-accelerated Cloud Server. https:\/\/www.huaweicloud.com\/en-us\/product\/fcs.html"},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. FPGA-based AWS EC2 F1 instances for Cloud Network Security. https:\/\/valtix.com\/blog\/valtix_ec2_f1_sc19\/"},{"key":"e_1_3_2_1_13_1","unstructured":"[n. d.]. FPGA Cloud Compute. https:\/\/cloud.baidu.com\/product\/fpga.html"},{"key":"e_1_3_2_1_14_1","unstructured":"[n. d.]. Huxelerate Standard Library. https:\/\/platform.huxelerate.it\/docs\/index.html"},{"key":"e_1_3_2_1_15_1","unstructured":"[n. d.]. Illumina DRAGEN on AWS. https:\/\/aws.amazon.com\/quickstart\/architecture\/illumina-dragen\/"},{"key":"e_1_3_2_1_16_1","unstructured":"[n. d.]. Intel Stratix 10 FPGA Applications. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/programmable\/fpga\/stratix-10\/applications.html"},{"key":"e_1_3_2_1_17_1","unstructured":"[n. d.]. TrustZone. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone"},{"key":"e_1_3_2_1_18_1","unstructured":"[n. d.]. Ultra96 Hardware User\u2019s Guide. http:\/\/zedboard.org\/sites\/default\/files\/documentations\/Ultra96-HW-User-Guide-rev-1-0-V0_9_preliminary.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"[n. d.]. UltraScale+ FPGAs Product Tables and Product Selection Guide. https:\/\/www.xilinx.com\/support\/documentation\/selection-guides\/ultrascale-plus-fpga-product-selection-guide.pdf"},{"key":"e_1_3_2_1_20_1","unstructured":"[n. d.]. Xilinx Applications. https:\/\/www.xilinx.com\/applications.html"},{"key":"e_1_3_2_1_21_1","unstructured":"[n. d.]. Xilinx Versal AI Core. https:\/\/www.xilinx.com\/products\/silicon-devices\/acap\/versal-ai-core.html#applications"},{"key":"e_1_3_2_1_22_1","unstructured":"2016. Comparing the Speed of VM Creating and SSH Access of Cloud Providers. cloud66"},{"key":"e_1_3_2_1_23_1","unstructured":"2017. Understanding and Profiling GCE Cold Boot Time. medium.com"},{"key":"e_1_3_2_1_24_1","volume-title":"Intel Stratix 10 Device Security User Guide","unstructured":"2020. Intel Stratix 10 Device Security User Guide. Intel Corporation."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2467797"},{"key":"e_1_3_2_1_26_1","volume-title":"Post-quantum cryptography. Nature, 549, 7671","author":"Bernstein Daniel J","year":"2017","unstructured":"Daniel J Bernstein and Tanja Lange. 2017. Post-quantum cryptography. Nature, 549, 7671 (2017), 188\u2013194."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"D. Champagne and R. B. Lee. 2010. Scalable architectural support for trusted software. In HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture. 1\u201312. issn:2378-203X https:\/\/doi.org\/10.1109\/HPCA.2010.5416657 10.1109\/HPCA.2010.5416657","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_30_1","volume-title":"Lai","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2018. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR, abs\/1802.09085 (2018), arxiv:1802.09085. arxiv:1802.09085"},{"key":"e_1_3_2_1_31_1","volume-title":"GPU: Performance and Innovation for GPU Computing. In 2020 IEEE Hot Chips 32 Symposium (HCS)","author":"Choquette Jack","year":"2020","unstructured":"Jack Choquette and Wishwesh Gandhi. 2020. NVIDIA\u2019s A100 GPU: Performance and Innovation for GPU Computing. In 2020 IEEE Hot Chips 32 Symposium (HCS), Virtual, August 16-18, 2020. IEEE."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2110592"},{"key":"e_1_3_2_1_34_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX. 857\u2013874. isbn:978-1-931971-32-4 https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3293895"},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Field-Programmable Logic and Applications (international conference on field-programmable logic and applications ed.)","author":"Eguro Ken","unstructured":"Ken Eguro and Ramarathnam Venkatesan. 2012. FPGAs for Trusted Cloud Computing. In International Conference on Field-Programmable Logic and Applications (international conference on field-programmable logic and applications ed.). IEEE. https:\/\/www.microsoft.com\/en-us\/research\/publication\/fpgas-for-trusted-cloud-computing\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01004-0_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/329166.329176"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714904"},{"key":"e_1_3_2_1_40_1","volume-title":"Deep learning-enabled medical computer vision. NPJ digital medicine, 4, 1","author":"Esteva Andre","year":"2021","unstructured":"Andre Esteva, Katherine Chou, Serena Yeung, Nikhil Naik, Ali Madani, Ali Mottaghi, Yun Liu, Eric Topol, Jeff Dean, and Richard Socher. 2021. Deep learning-enabled medical computer vision. NPJ digital medicine, 4, 1 (2021), 1\u20139."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.58"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_16"},{"key":"e_1_3_2_1_45_1","volume-title":"Agilex Generation of Intel FPGAs. In 2020 IEEE Hot Chips 32 Symposium (HCS)","author":"Ganusov Ilya","year":"2020","unstructured":"Ilya Ganusov and Mahesh Iyer. 2020. Agilex Generation of Intel FPGAs. In 2020 IEEE Hot Chips 32 Symposium (HCS), Virtual, August 16-18, 2020. IEEE."},{"key":"e_1_3_2_1_46_1","volume-title":"A Fully Homomorphic Encryption Scheme. Ph. D. Dissertation","author":"Gentry Craig","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph. D. Dissertation. Stanford, CA, USA. isbn:978-1-109-44450-6 AAI3382729"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2019.00064"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282307"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757323"},{"key":"e_1_3_2_1_51_1","volume-title":"Telekine: Secure Computing with Cloud GPUs. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hunt Tyler","year":"2020","unstructured":"Tyler Hunt, Zhipeng Jia, Vance Miller, Ariel Szekely, Yige Hu, Christopher J. Rossbach, and Emmett Witchel. 2020. Telekine: Secure Computing with Cloud GPUs. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA. 817\u2013833. isbn:978-1-939133-13-7 https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/hunt"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3086143"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/3450980.3450986"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00014"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201918)","author":"Khawaja Ahmed","year":"1931","unstructured":"Ahmed Khawaja, Joshua Landgraf, Rohith Prakash, Michael Wei, Eric Schkufza, and Christopher J. Rossbach. 2018. Sharing, Protection, and Compatibility for Reconfigurable Fabric with Amorphos. In Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201918). USENIX Association, USA. 107\u2013127. isbn:9781931971478"},{"key":"e_1_3_2_1_58_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P\u201919)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P\u201919)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192379"},{"key":"e_1_3_2_1_60_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Korolija Dario","year":"2020","unstructured":"Dario Korolija, Timothy Roscoe, and Gustavo Alonso. 2020. Do OS abstractions make sense on FPGAs? In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 991\u20131010. isbn:978-1-939133-19-9 https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/roscoe"},{"key":"e_1_3_2_1_61_1","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In 12th USENIX Workshop on Offensive Technologies (WOOT 18). USENIX Association, Baltimore, MD. https:\/\/www.usenix.org\/conference\/woot18\/presentation\/koruyeh"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942094"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00011"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_65_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2015.2252"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715263"},{"key":"e_1_3_2_1_69_1","volume-title":"Agile SoC Development with Open ESP. In 2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD 20)","author":"Mantovani Paolo","unstructured":"Paolo Mantovani, Davide Giri, Giuseppe Di Guglielmo, Luca Piccolboni, Joseph Zuckerman, Emilio G. Cota, Michele Petracca, Christian Pilato, and Luca P. Carloni. 2020. Agile SoC Development with Open ESP. In 2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD 20)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/647928.739896"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069223"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830819"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516678"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00069"},{"key":"e_1_3_2_1_76_1","volume-title":"Developing Tamper-Resistant Designs with UltraScale and UltraScale+ FPGAs. Xilinx","author":"Peterson Ed","unstructured":"Ed Peterson. 2018. Developing Tamper-Resistant Designs with UltraScale and UltraScale+ FPGAs. Xilinx, Inc.."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","unstructured":"M. Sabt M. Achemlal and A. Bouabdallah. 2015. Trusted Execution Environment: What It is and What It is Not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA. 1 57\u201364. https:\/\/doi.org\/10.1109\/Trustcom.2015.357 10.1109\/Trustcom.2015.357","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342177"},{"key":"e_1_3_2_1_80_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss.","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. In CCS."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783720"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890150"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322228"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906)","author":"Ta-Min Richard","year":"2006","unstructured":"Richard Ta-Min, Lionel Litty, and David Lie. 2006. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906). USENIX Association, Berkeley, CA, USA. 279\u2013292. isbn:1-931971-47-1 http:\/\/dl.acm.org\/citation.cfm?id=1298455.1298482"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031556"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173193"},{"key":"e_1_3_2_1_90_1","volume-title":"IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19)","author":"v. Gleissenthall Klaus","year":"2019","unstructured":"Klaus v. Gleissenthall, Rami G\u00f6khan K\u0131c\u0131, Deian Stefan, and Ranjit Jhala. 2019. IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. 1411\u20131428. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/von-gleissenthall"},{"key":"e_1_3_2_1_91_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_93_1","volume-title":"RIDL: Rogue In-flight Data Load. In S&P.","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-flight Data Load. In S&P."},{"key":"e_1_3_2_1_94_1","volume-title":"Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA. 681\u2013696. isbn:978-1-931971-47-8 https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/volos"},{"key":"e_1_3_2_1_95_1","volume-title":"Xilinx Versal Premium Series. In 2020 IEEE Hot Chips 32 Symposium (HCS)","author":"Voogel Martin","year":"2020","unstructured":"Martin Voogel, Yohan Frans, and Matt Ouellette. 2020. Xilinx Versal Premium Series. In 2020 IEEE Hot Chips 32 Symposium (HCS), Virtual, August 16-18, 2020. IEEE."},{"key":"e_1_3_2_1_96_1","volume-title":"XAPP 1267: Using Encryption and Authentication to Secure an UltraScale\/UltraScale+ FPGA Bitstream. Xilinx","author":"Wilkinson Kyle","unstructured":"Kyle Wilkinson. 2018. XAPP 1267: Using Encryption and Authentication to Secure an UltraScale\/UltraScale+ FPGA Bitstream. Xilinx, Inc.."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00047"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00044"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.46"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486998"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666141.2666145"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174243.3174255"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:39Z","timestamp":1750191099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":102,"alternative-id":["10.1145\/3503222.3507733","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507733","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}