{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:40:01Z","timestamp":1770338401652,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI-01-0247-FEDER-045907"],"award-info":[{"award-number":["POCI-01-0247-FEDER-045907"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/146528\/2019"],"award-info":[{"award-number":["SFRH\/BD\/146528\/2019"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["LA\/P\/0063\/2020"],"award-info":[{"award-number":["LA\/P\/0063\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,27]]},"DOI":"10.1145\/3555776.3578591","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:16:29Z","timestamp":1686158189000},"page":"135-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["SOTERIA: Preserving Privacy in Distributed Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4293-9887","authenticated-orcid":false,"given":"Cl\u00e1udia","family":"Brito","sequence":"first","affiliation":[{"name":"INESC TEC &amp; University of Minho, Braga, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3838-8664","authenticated-orcid":false,"given":"Pedro","family":"Ferreira","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; Faculty of Sciences, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7203-2621","authenticated-orcid":false,"given":"Bernardo","family":"Portela","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; Faculty of Sciences, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3408-7346","authenticated-orcid":false,"given":"Rui","family":"Oliveira","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; University of Minho, Braga, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9752-2822","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Paulo","sequence":"additional","affiliation":[{"name":"INESC TEC &amp; University of Minho, Braga, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. SOTERIA Proof. https:\/\/dbr-haslab.github.io\/repository\/sac23.pdf.  [n.d.]. SOTERIA Proof. https:\/\/dbr-haslab.github.io\/repository\/sac23.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Privacy-preserving machine learning: Threats and solutions","author":"Al-Rubaie Mohammad","unstructured":"Mohammad Al-Rubaie and J Morris Chang . 2019. Privacy-preserving machine learning: Threats and solutions . IEEE Security & Privacy . Mohammad Al-Rubaie and J Morris Chang. 2019. Privacy-preserving machine learning: Threats and solutions. IEEE Security & Privacy."},{"key":"e_1_3_2_1_3_1","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","author":"Aono Yoshinori","year":"2017","unstructured":"Yoshinori Aono , Takuya Hayashi , Lihua Wang , Shiho Moriai , 2017 . Privacy-preserving deep learning via additively homomorphic encryption . IEEE Transactions on Information Forensics and Security. Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, et al. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security.","journal-title":"IEEE Transactions on Information Forensics and Security."},{"key":"e_1_3_2_1_4_1","unstructured":"Microsoft Azure. [n. d.]. Azure Confidential Computing. https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/. (Accessed on 22\/10\/2022).  Microsoft Azure. [n. d.]. Azure Confidential Computing. https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/. (Accessed on 22\/10\/2022)."},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer.","author":"Bahmani Raad","year":"2017","unstructured":"Raad Bahmani , Manuel Barbosa , Ferdinand Brasser , Bernardo Portela , 2017 . Secure multiparty computation from SGX . In International Conference on Financial Cryptography and Data Security. Springer. Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, et al. 2017. Secure multiparty computation from SGX. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_1_6_1","volume-title":"Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. In 6th International Conference on Learning Representations,.","author":"Brendel Wieland","year":"2018","unstructured":"Wieland Brendel , Jonas Rauber , and Matthias Bethge . 2018 . Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. In 6th International Conference on Learning Representations,. Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2018. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. In 6th International Conference on Learning Representations,."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489286"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_10_1","unstructured":"Databricks. [n. d.]. Optimizing Apache Spark UDFs. https:\/\/www.databricks.com\/session_eu20\/optimizing-apache-spark-udfs. (Accessed on 27\/10\/2022).  Databricks. [n. d.]. Optimizing Apache Spark UDFs. https:\/\/www.databricks.com\/session_eu20\/optimizing-apache-spark-udfs. (Accessed on 27\/10\/2022)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Tu Dinh Ngoc Bao Bui Stella Bitchebe Alain Tchana etal 2019. Everything you should know about Intel SGX performance on virtualized systems. ACM on Measurement and Analysis of Computing Systems.  Tu Dinh Ngoc Bao Bui Stella Bitchebe Alain Tchana et al. 2019. Everything you should know about Intel SGX performance on virtualized systems. ACM on Measurement and Analysis of Computing Systems.","DOI":"10.1145\/3309697.3331480"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Muhammad El-Hindi Tobias Ziegler Matthias Heinrich Adrian Lutsch etal 2022. Benchmarking the Second Generation of Intel SGX Hardware. In Data Management on New Hardware.  Muhammad El-Hindi Tobias Ziegler Matthias Heinrich Adrian Lutsch et al. 2022. Benchmarking the Second Generation of Intel SGX Hardware. In Data Management on New Hardware.","DOI":"10.1145\/3533737.3535098"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_14_1","unstructured":"Large-Scale Data & Systems (LSDS) Group. [n. d.]. SGX-Spark. https:\/\/github.com\/lsds\/sgx-spark. (Accessed on 22\/10\/2022).  Large-Scale Data & Systems (LSDS) Group. [n. d.]. SGX-Spark. https:\/\/github.com\/lsds\/sgx-spark. (Accessed on 22\/10\/2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.","author":"Hunt Tyler","year":"2018","unstructured":"Tyler Hunt , Congzheng Song , Reza Shokri , Vitaly Shmatikov , 2018 . Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961. Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, et al. 2018. Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961."},{"key":"e_1_3_2_1_16_1","unstructured":"Nick Hynes Raymond Cheng and Dawn Song. 2018. Efficient deep learning on multi-source private data. arXiv preprint arXiv:1807.06689.  Nick Hynes Raymond Cheng and Dawn Song. 2018. Efficient deep learning on multi-source private data. arXiv preprint arXiv:1807.06689."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel. [n. d.]. HiBench is a big data benchmark suite. https:\/\/github.com\/Intel-bigdata\/HiBench. (Accessed on 22\/10\/2022).  Intel. [n. d.]. HiBench is a big data benchmark suite. https:\/\/github.com\/Intel-bigdata\/HiBench. (Accessed on 22\/10\/2022)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2016.08.016","article-title":"On cloud security attacks: A taxonomy and intrusion detection and prevention as a service","author":"Iqbal Salman","year":"2016","unstructured":"Salman Iqbal , Miss Laiha Mat Kiah , Babak Dhaghighi , Muzammil Hussain , Suleman Khan , Muhammad Khurram Khan , and Kim-Kwang Raymond Choo . 2016 . On cloud security attacks: A taxonomy and intrusion detection and prevention as a service . Journal of Network and Computer Applications. Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. 2016. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications.","journal-title":"Journal of Network and Computer Applications."},{"key":"e_1_3_2_1_19_1","volume-title":"15th ACM Asia Conference on Computer and Communications Security.","author":"Jiang Jianyu","year":"2020","unstructured":"Jianyu Jiang , Xusheng Chen , TszOn Li , Cheng Wang , 2020 . Uranus: Simple, efficient sgx programming and its applications . In 15th ACM Asia Conference on Computer and Communications Security. Jianyu Jiang, Xusheng Chen, TszOn Li, Cheng Wang, et al. 2020. Uranus: Simple, efficient sgx programming and its applications. In 15th ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_20_1","volume-title":"5th International Conference on Learning Representations.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian J. Goodfellow , and Samy Bengio . 2017 . Adversarial Machine Learning at Scale . In 5th International Conference on Learning Representations. Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas etal 2013. Innovative instructions and software model for isolated execution. Hasp isca.  Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas et al. 2013. Innovative instructions and software model for isolated execution. Hasp isca.","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_22_1","article-title":"Mllib: Machine learning in apache spark","author":"Meng Xiangrui","year":"2016","unstructured":"Xiangrui Meng , Joseph Bradley , Burak Yavuz , Evan Sparks , 2016 . Mllib: Machine learning in apache spark . The Journal of Machine Learning Research. Xiangrui Meng, Joseph Bradley, Burak Yavuz, Evan Sparks, et al. 2016. Mllib: Machine learning in apache spark. The Journal of Machine Learning Research.","journal-title":"The Journal of Machine Learning Research."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241143"},{"key":"e_1_3_2_1_24_1","volume-title":"29th USENIX Security Symposium.","author":"Salem Ahmed","year":"2020","unstructured":"Ahmed Salem , Apratim Bhattacharya , Michael Backes , Mario Fritz , and other. 2020 . Updates-leak: Data set inference and reconstruction attacks in online learning . In 29th USENIX Security Symposium. Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, and other. 2020. Updates-leak: Data set inference and reconstruction attacks in online learning. In 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_25_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Shaon Fahad","year":"2017","unstructured":"Fahad Shaon , Murat Kantarcioglu , Zhiqiang Lin , and Latifur Khan . 2017 . Sgx-bigmatrix: A practical encrypted data analytic framework with trusted processors . In ACM SIGSAC Conference on Computer and Communications Security. Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, and Latifur Khan. 2017. Sgx-bigmatrix: A practical encrypted data analytic framework with trusted processors. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_26_1","volume-title":"Symposium on Security and Privacy (SP).","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri , Marco Stronati , Congzheng Song , and Vitaly Shmatikov . 2017 . Membership inference attacks against machine learning models . In Symposium on Security and Privacy (SP). Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_27_1","volume-title":"Elaine Shi, T-H Hubert Chan, et al.","author":"Stefanov Emil","year":"2018","unstructured":"Emil Stefanov , Marten Van Dijk , Elaine Shi, T-H Hubert Chan, et al. 2018 . Path ORAM: an extremely simple oblivious RAM protocol. J. ACM. Emil Stefanov, Marten Van Dijk, Elaine Shi, T-H Hubert Chan, et al. 2018. Path ORAM: an extremely simple oblivious RAM protocol. J. ACM."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"e_1_3_2_1_29_1","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition.","author":"Truong Jean-Baptiste","year":"2021","unstructured":"Jean-Baptiste Truong , Pratyush Maini , Robert J Walls , and Nicolas Papernot . 2021 . Data-free model extraction . In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. Jean-Baptiste Truong, Pratyush Maini, Robert J Walls, and Nicolas Papernot. 2021. Data-free model extraction. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Annual Technical Conference.","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai , Donald E Porter , and Mona Vij . 2017 . Graphene-sgx: A practical library OS for unmodified applications on SGX . In USENIX Annual Technical Conference. Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-sgx: A practical library OS for unmodified applications on SGX. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Matei Zaharia Reynold S Xin Patrick Wendell Tathagata Das etal 2016. Apache spark: a unified engine for big data processing. Commun. ACM.  Matei Zaharia Reynold S Xin Patrick Wendell Tathagata Das et al. 2016. Apache spark: a unified engine for big data processing. Commun. ACM.","DOI":"10.1145\/2934664"},{"key":"e_1_3_2_1_32_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, et al. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation."}],"event":{"name":"SAC '23: 38th ACM\/SIGAPP Symposium on Applied Computing","location":"Tallinn Estonia","acronym":"SAC '23","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3578591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555776.3578591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:35Z","timestamp":1750182695000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3578591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":32,"alternative-id":["10.1145\/3555776.3578591","10.1145\/3555776"],"URL":"https:\/\/doi.org\/10.1145\/3555776.3578591","relation":{},"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}