{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:26:52Z","timestamp":1774600012080,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545972","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"86-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["On the Challenges of Detecting Side-Channel Attacks in SGX"],"prefix":"10.1145","author":[{"given":"Jianyu","family":"Jiang","sequence":"first","affiliation":[{"name":"The University of Hong Kong, China"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe, Spain"}]},{"given":"Ghassan","family":"Karame","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. 97% on MNIST with a single decision tree (+ t-SNE). https:\/\/www.kaggle.com\/carlolepelaars\/97-on-mnist-with-a-single-decision-tree-t-sne.  2019. 97% on MNIST with a single decision tree (+ t-SNE). https:\/\/www.kaggle.com\/carlolepelaars\/97-on-mnist-with-a-single-decision-tree-t-sne."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. MNIST Dataset. http:\/\/yann.lecun.com\/exdb\/mnist\/.  2022. MNIST Dataset. http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. OpenCV. https:\/\/github.com\/opencv\/opencv.  2022. OpenCV. https:\/\/github.com\/opencv\/opencv."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Redis Benchmark. https:\/\/redis.io\/topics\/benchmarks.  2022. Redis Benchmark. https:\/\/redis.io\/topics\/benchmarks."},{"key":"e_1_3_2_1_5_1","volume-title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS.","author":"Ahmad Adil","year":"2019","unstructured":"Adil Ahmad , Byunggill Joe , Yuan Xiao , Yinqian Zhang , Insik Shin , and Byoungyoung Lee . 2019 . OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS. Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee. 2019. OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"LibSEAL: revealing service integrity violations using trusted execution. In Proceedings of the Thirteenth EuroSys Conference","volume":"24","author":"Aublin Pierre-Louis","year":"2018","unstructured":"Pierre-Louis Aublin , Florian Kelbert , Dan O\u2019Keeffe , Divya Muthukumaran , Christian Priebe , Joshua Lind , Robert Krahn , Christof Fetzer , David\u00a0 M. Eyers , and Peter\u00a0 R. Pietzuch . 2018 . LibSEAL: revealing service integrity violations using trusted execution. In Proceedings of the Thirteenth EuroSys Conference , EuroSys. 24 : 1 \u2013 24 :15. Pierre-Louis Aublin, Florian Kelbert, Dan O\u2019Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David\u00a0M. Eyers, and Peter\u00a0R. Pietzuch. 2018. LibSEAL: revealing service integrity violations using trusted execution. In Proceedings of the Thirteenth EuroSys Conference, EuroSys. 24:1\u201324:15.","journal-title":"EuroSys."},{"key":"e_1_3_2_1_7_1","volume-title":"TEE-Perf: A Profiler for Trusted Execution Environments. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 414\u2013421","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu , Donald Dragoti , Pramod Bhatotia , and Christof Fetzer . 2019 . TEE-Perf: A Profiler for Trusted Execution Environments. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 414\u2013421 . Maurice Bailleu, Donald Dragoti, Pramod Bhatotia, and Christof Fetzer. 2019. TEE-Perf: A Profiler for Trusted Execution Environments. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 414\u2013421."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"e_1_3_2_1_9_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT). 1\u201312","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT). 1\u201312 . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT). 1\u201312."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176320"},{"key":"e_1_3_2_1_11_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Bulck Jo\u00a0Van","year":"2017","unstructured":"Jo\u00a0Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In 26th USENIX Security Symposium (USENIX Security 17) . 1041\u20131056. Jo\u00a0Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In 26th USENIX Security Symposium (USENIX Security 17). 1041\u20131056."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3113\/JSOA.2018.0102"},{"key":"e_1_3_2_1_13_1","unstructured":"Sanchuan Chen. 2021. D\u00e9j\u00e0 Vu. https:\/\/github.com\/schuan\/dejavu. Accessed on 22\/11\/2021.  Sanchuan Chen. 2021. D\u00e9j\u00e0 Vu. https:\/\/github.com\/schuan\/dejavu. Accessed on 22\/11\/2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9j\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security, (AsiaCCS). 7\u201318","author":"Chen Sanchuan","year":"2017","unstructured":"Sanchuan Chen , Xiaokuan Zhang , Michael\u00a0 K. Reiter , and Yinqian Zhang . 2017 . Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9j\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security, (AsiaCCS). 7\u201318 . Sanchuan Chen, Xiaokuan Zhang, Michael\u00a0K. Reiter, and Yinqian Zhang. 2017. Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9j\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security, (AsiaCCS). 7\u201318."},{"key":"e_1_3_2_1_15_1","volume-title":"26th USENIX Security Symposium, USENIX Security. 51\u201367","author":"Disselkoen Craig","year":"2017","unstructured":"Craig Disselkoen , David Kohlbrenner , Leo Porter , and Dean\u00a0 M. Tullsen . 2017 . Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX . In 26th USENIX Security Symposium, USENIX Security. 51\u201367 . Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean\u00a0M. Tullsen. 2017. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. In 26th USENIX Security Symposium, USENIX Security. 51\u201367."},{"key":"e_1_3_2_1_16_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olya Ohrimenko , Istvan Haller , and Manuel Costa . 2017 . Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory . In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 217\u2013233. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/gruss Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 217\u2013233. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/gruss"},{"key":"e_1_3_2_1_17_1","volume-title":"The Web Conference, WWW. 159\u2013162","author":"Kurnikov Arseny","unstructured":"Arseny Kurnikov , Klaudia Krawiecka , Andrew Paverd , Mohammad Mannan , and N. Asokan . 2018. Using SafeKeeper to Protect Web Passwords . In The Web Conference, WWW. 159\u2013162 . Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohammad Mannan, and N. Asokan. 2018. Using SafeKeeper to Protect Web Passwords. In The Web Conference, WWW. 159\u2013162."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_3"},{"key":"e_1_3_2_1_20_1","volume-title":"CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69\u201390","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi , Gorka Irazoqui , and Thomas Eisenbarth . 2017 . CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69\u201390 . Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69\u201390."},{"key":"e_1_3_2_1_21_1","volume-title":"CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium. 469\u2013486","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi , Jo Van\u00a0Bulck , Nadia Heninger , Frank Piessens , and Berk Sunar . 2020 . CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium. 469\u2013486 . Daniel Moghimi, Jo Van\u00a0Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium. 469\u2013486."},{"key":"e_1_3_2_1_22_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious multi-party machine learning on trusted processors . In 25th USENIX Security Symposium (USENIX Security 16) . 619\u2013636. Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In 25th USENIX Security Symposium (USENIX Security 16). 619\u2013636."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Annual Technical Conference (ATC). 227\u2013240","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko , Bohdan Trach , Robert Krahn , Mark Silberstein , and Christof Fetzer . 2018 . Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks . In USENIX Annual Technical Conference (ATC). 227\u2013240 . Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In USENIX Annual Technical Conference (ATC). 227\u2013240."},{"key":"e_1_3_2_1_24_1","volume-title":"CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Orenbach Meni","year":"2019","unstructured":"Meni Orenbach , Yan Michalevsky , Christof Fetzer , and Mark Silberstein . 2019 . CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 555\u2013570. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/orenbach Meni Orenbach, Yan Michalevsky, Christof Fetzer, and Mark Silberstein. 2019. CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 555\u2013570. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/orenbach"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium 2017 (NDSS\u201917)(network and distributed system security symposium 2017 (ndss\u201917) ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/t-sgx-eradicating-controlled-channel-attacks-enclave-programs\/  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium 2017 (NDSS\u201917)(network and distributed system security symposium 2017 (ndss\u201917) ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/t-sgx-eradicating-controlled-channel-attacks-enclave-programs\/","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_28_1","volume-title":"Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS.","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde , Dat Le\u00a0Tien , Shruti Tople , and Prateek Saxena . 2017 . Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS. Shweta Shinde, Dat Le\u00a0Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications With SGX Enclaves.. In NDSS."},{"key":"e_1_3_2_1_29_1","unstructured":"SSLab@Gatech. 2021. T-SGX. https:\/\/github.com\/sslab-gatech\/t-sgx. Accessed on 22\/11\/2021.  SSLab@Gatech. 2021. T-SGX. https:\/\/github.com\/sslab-gatech\/t-sgx. Accessed on 22\/11\/2021."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080208"},{"key":"e_1_3_2_1_34_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (SP). 640\u2013656","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015 . Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (SP). 640\u2013656 . Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (SP). 640\u2013656."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:17Z","timestamp":1750188617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":33,"alternative-id":["10.1145\/3545948.3545972","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545972","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}