{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:40:46Z","timestamp":1773931246636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ontario Graduate Scholarships"},{"name":"NSERC","award":["CRDPJ-534381"],"award-info":[{"award-number":["CRDPJ-534381"]}]},{"DOI":"10.13039\/501100001804","name":"Canada Research Chairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560603","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2565-2579","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Fast Fully Oblivious Compaction and Shuffling"],"prefix":"10.1145","author":[{"given":"Sajin","family":"Sasy","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Aaron","family":"Johnson","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory, Washington, DC, USA"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2021","author":"Mubashwir Alam A K M","year":"2021","unstructured":"A K M Mubashwir Alam , Sagar Sharma , and Keke Chen . 2021 . SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data- Intensive SGX Applications . Proceedings on Privacy Enhancing Technologies , Vol. 2021 , 1 (2021). A K M Mubashwir Alam, Sagar Sharma, and Keke Chen. 2021. SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data- Intensive SGX Applications. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 1 (2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/innovative-technology-for-cpu-based-attestation-and-sealing.html. Accessed","author":"Anati Ittai","year":"2021","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013. Innovative Technology for CPU Based Attestation and Sealing. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/innovative-technology-for-cpu-based-attestation-and-sealing.html. Accessed December 2021 . Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/innovative-technology-for-cpu-based-attestation-and-sealing.html. Accessed December 2021."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976014.2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Gilad Asharov Ilan Komargodski Wei-Kai Lin Kartik Nayak Enoch Peserico Elaine Shi and Yuval Ishai. 2020b. OptORAMa: Optimal Oblivious RAM. In Advances in Cryptology (EUROCRYPT).  Gilad Asharov Ilan Komargodski Wei-Kai Lin Kartik Nayak Enoch Peserico Elaine Shi and Yuval Ishai. 2020b. OptORAMa: Optimal Oblivious RAM. In Advances in Cryptology (EUROCRYPT).","DOI":"10.1007\/978-3-030-45724-2_14"},{"key":"e_1_3_2_1_6_1","volume-title":"Oblivious Parallel Tight Compaction. In Conference on Information-Theoretic Cryptography (ITC).","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , Ilan Komargodski , Wei-Kai Lin , Enoch Peserico , and Elaine Shi . 2020 c. Oblivious Parallel Tight Compaction. In Conference on Information-Theoretic Cryptography (ITC). Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, and Elaine Shi. 2020c. Oblivious Parallel Tight Compaction. In Conference on Information-Theoretic Cryptography (ITC)."},{"key":"e_1_3_2_1_7_1","unstructured":"Borja Balle Gilles Barthe and Marco Gaboardi. 2018. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences. In Advances in Neural Information Processing Systems (NeurIPS).  Borja Balle Gilles Barthe and Marco Gaboardi. 2018. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0301-1"},{"key":"e_1_3_2_1_11_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT).","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fc ller, Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT). Ferdinand Brasser, Urs M\u00fc ller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P). https:\/\/doi.org\/10","author":"Chen Guoxing","year":"2019","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H. Lai . 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution . In IEEE European Symposium on Security and Privacy (EuroS&P). https:\/\/doi.org\/10 .1109\/EuroSP. 2019 .00020 10.1109\/EuroSP.2019.00020 Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. In IEEE European Symposium on Security and Privacy (EuroS&P). https:\/\/doi.org\/10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_13_1","volume-title":"Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9J\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Chen Sanchuan","year":"2017","unstructured":"Sanchuan Chen , Xiaokuan Zhang , Michael K. Reiter , and Yinqian Zhang . 2017 . Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9J\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security (AsiaCCS). Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, and Yinqian Zhang. 2017. Detecting Privileged Side-Channel Attacks in Shielded Execution with D\u00e9J\u00e0 Vu. In ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746629"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0026"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57990-6_13"},{"key":"e_1_3_2_1_19_1","volume-title":"On the Practicality of Data-oblivious Sorting. Ph.,D. Dissertation. Aarhus Universitet","author":"Ebbesen Kris Vestergaard","unstructured":"Kris Vestergaard Ebbesen . 2015. On the Practicality of Data-oblivious Sorting. Ph.,D. Dissertation. Aarhus Universitet , Datalogisk Institut . Kris Vestergaard Ebbesen. 2015. On the Practicality of Data-oblivious Sorting. Ph.,D. Dissertation. Aarhus Universitet, Datalogisk Institut."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"e_1_3_2_1_21_1","volume-title":"Information-Theoretic Cryptography (ITC","author":"Falk Brett Hemenway","year":"2021","unstructured":"Brett Hemenway Falk and Rafail Ostrovsky . 2021. Secure Merge with O (n log log n) Secure Operations . In Information-Theoretic Cryptography (ITC 2021 ). Brett Hemenway Falk and Rafail Ostrovsky. 2021. Secure Merge with O (n log log n) Secure Operations. In Information-Theoretic Cryptography (ITC 2021)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989555"},{"key":"e_1_3_2_1_23_1","volume-title":"Cache Attacks on Intel SGX. European Workshop on Systems Security (EuroSec)","author":"G\u00f6tzfried J.","year":"2017","unstructured":"J. G\u00f6tzfried , Moritz Eckert , Sebastian Schinzel , and Tilo M\u00fcller . 2017 . Cache Attacks on Intel SGX. European Workshop on Systems Security (EuroSec) (2017). J. G\u00f6tzfried, Moritz Eckert, Sebastian Schinzel, and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX. European Workshop on Systems Security (EuroSec) (2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"Commun. ACM","volume":"29","author":"Daniel Hillis W","year":"1986","unstructured":"W Daniel Hillis and Guy L Steele Jr . 1986 . Data parallel algorithms . Commun. ACM , Vol. 29 , 12 (1986). W Daniel Hillis and Guy L Steele Jr. 1986. Data parallel algorithms. Commun. ACM, Vol. 29, 12 (1986)."},{"key":"e_1_3_2_1_25_1","volume-title":"Intel Trusted Execution Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/trusted-execution-technology-security-paper.html. Accessed","year":"2021","unstructured":"Intel. 2012. Intel Trusted Execution Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/trusted-execution-technology-security-paper.html. Accessed December 2021 . Intel. 2012. Intel Trusted Execution Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/trusted-execution-technology\/trusted-execution-technology-security-paper.html. Accessed December 2021."},{"key":"e_1_3_2_1_26_1","volume-title":"Q3 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00161.html. Accessed","year":"2021","unstructured":"Intel. 2018. Q3 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00161.html. Accessed December 2021 . Intel. 2018. Q3 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00161.html. Accessed December 2021."},{"key":"e_1_3_2_1_27_1","volume-title":"Intel Processors Voltage Settings Modification Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00289.html. Accessed","year":"2021","unstructured":"Intel. 2019. Intel Processors Voltage Settings Modification Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00289.html. Accessed December 2021 . Intel. 2019. Intel Processors Voltage Settings Modification Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00289.html. Accessed December 2021."},{"key":"e_1_3_2_1_28_1","volume-title":"AMD memory encryption. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf. Accessed","author":"Kaplan David","year":"2021","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf. Accessed December 2021 . David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf. Accessed December 2021."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407814"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium.","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee , Dongha Jung , Ian T. Fang , Chia-Che Tsai , and Raluca Ada Popa . 2020 a. An Off-Chip Attack on Hardware Enclaves via the Memory Bus . In USENIX Security Symposium. Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, and Raluca Ada Popa. 2020a. An Off-Chip Attack on Hardware Enclaves via the Memory Bus. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","volume-title":"Keystone: An Open Framework for Architecting TEEs. In European Conference on Computer Systems (EuroSys).","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee , David Kohlbrenner , Shweta Shinde , Krste Asanovi\u0107 , and Dawn Song . 2020 b. Keystone: An Open Framework for Architecting TEEs. In European Conference on Computer Systems (EuroSys). Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanovi\u0107, and Dawn Song. 2020b. Keystone: An Open Framework for Architecting TEEs. In European Conference on Computer Systems (EuroSys)."},{"key":"e_1_3_2_1_32_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002240000068"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.148"},{"key":"e_1_3_2_1_35_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Liu Fangfei","unstructured":"Fangfei Liu , Yuval Yarom , Qian Ge , Gernot Heiser , and Ruby B. Lee . 2015. Last-Level Cache Side-Channel Attacks are Practical . In IEEE Symposium on Security and Privacy (S&P). Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_36_1","volume-title":"Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy (S&P).","author":"Mishra Pratyush","year":"2018","unstructured":"Pratyush Mishra , Rishabh Poddar , Jerry Chen , Alessandro Chiesa , and Raluca Ada Popa . 2018 . Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy (S&P). Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. 2018. Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_37_1","volume-title":"Symposium on Theoretical Aspects of Computer Science (STACS).","author":"Mitchell John C","year":"2014","unstructured":"John C Mitchell and Joe Zimmerman . 2014 . Data-oblivious data structures . In Symposium on Theoretical Aspects of Computer Science (STACS). John C Mitchell and Joe Zimmerman. 2014. Data-oblivious data structures. In Symposium on Theoretical Aspects of Computer Science (STACS)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Ahmad Moghimi Gorka Irazoqui and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In Cryptographic Hardware and Embedded Systems (CHES).  Ahmad Moghimi Gorka Irazoqui and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In Cryptographic Hardware and Embedded Systems (CHES).","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_39_1","volume-title":"CopyCat: Controlled Instruction-Level Attacks on Enclaves. In USENIX Security Symposium.","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi , Jo Van Bulck , Nadia Heninger , Frank Piessens , and Berk Sunar . 2020 . CopyCat: Controlled Instruction-Level Attacks on Enclaves. In USENIX Security Symposium. Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In USENIX Security Symposium."},{"key":"e_1_3_2_1_40_1","volume-title":"Randomized algorithms","author":"Motwani Rajeev","unstructured":"Rajeev Motwani and Prabhakar Raghavan . 1995. Randomized algorithms . Cambridge University Press . Rajeev Motwani and Prabhakar Raghavan. 1995. Randomized algorithms. Cambridge University Press."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Olga Ohrimenko Michael T Goodrich Roberto Tamassia and Eli Upfal. 2014. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata Languages and Programming (ICALP).  Olga Ohrimenko Michael T Goodrich Roberto Tamassia and Eli Upfal. 2014. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata Languages and Programming (ICALP).","DOI":"10.1007\/978-3-662-43951-7_47"},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium.","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious multi-party machine learning on trusted processors . In USENIX Security Symposium. Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In USENIX Security Symposium."},{"key":"e_1_3_2_1_44_1","volume-title":"Cache Attacks and Countermeasures: The Case of AES. In RSA Conference (CT-RSA).","author":"Osvik Dag Arne","year":"2006","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006 . Cache Attacks and Countermeasures: The Case of AES. In RSA Conference (CT-RSA). Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In RSA Conference (CT-RSA)."},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Security Symposium.","author":"Poddar Rishabh","year":"2020","unstructured":"Rishabh Poddar , Ganesh Ananthanarayanan , Srinath Setty , Stavros Volos , and Raluca Ada Popa . 2020 . Visor: Privacy-Preserving Video Analytics as a Cloud Service . In USENIX Security Symposium. Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, and Raluca Ada Popa. 2020. Visor: Privacy-Preserving Video Analytics as a Cloud Service. In USENIX Security Symposium."},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security Symposium.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution . In USENIX Security Symposium. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3157734"},{"key":"e_1_3_2_1_48_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Sasy Sajin","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W. Fletcher . 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX . In Network and Distributed System Security Symposium (NDSS). Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Aaron Johnson and Ian Goldberg. 2022. Fast Fully Oblivious Compaction and Shuffling. https:\/\/crysp.uwaterloo.ca\/software\/obliv\/.  Sajin Sasy Aaron Johnson and Ian Goldberg. 2022. Fast Fully Oblivious Compaction and Shuffling. https:\/\/crysp.uwaterloo.ca\/software\/obliv\/.","DOI":"10.1145\/3548606.3560603"},{"key":"e_1_3_2_1_50_1","unstructured":"Sajin Sasy and Olga Ohrimenko. 2019. Oblivious Sampling Algorithms for Private Data Analysis. In Advances in Neural Information Processing Systems (NeurIPS).  Sajin Sasy and Olga Ohrimenko. 2019. Oblivious Sampling Algorithms for Private Data Analysis. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_51_1","volume-title":"Securing Intel SGX against side-channel attacks via load-time synthesis. Ph.,D. Dissertation","author":"Shih Mingwei","unstructured":"Mingwei Shih . 2019. Securing Intel SGX against side-channel attacks via load-time synthesis. Ph.,D. Dissertation . Georgia Institute of Technology . Mingwei Shih. 2019. Securing Intel SGX against side-channel attacks via load-time synthesis. Ph.,D. Dissertation. Georgia Institute of Technology."},{"key":"e_1_3_2_1_52_1","volume-title":"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium (NDSS).","author":"Shih Ming-Wei","year":"2017","unstructured":"Ming-Wei Shih , Sangho Lee , Taesoo Kim , and Marcus Peinado . 2017 . T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium (NDSS). Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00009"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(90)90349-5"},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX Security Symposium.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In USENIX Security Symposium. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_57_1","volume-title":"USENIX Security Symposium.","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In USENIX Security Symposium. Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_58_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P).","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015 . Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P). Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_59_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560603","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:58Z","timestamp":1750182538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":56,"alternative-id":["10.1145\/3548606.3560603","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560603","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}