{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:08:57Z","timestamp":1755997737350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:00:00Z","timestamp":1668384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF CAREER","award":["1943347"],"award-info":[{"award-number":["1943347"]}]},{"name":"NSF CISE Expeditions","award":["CCF-1730628"],"award-info":[{"award-number":["CCF-1730628"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,14]]},"DOI":"10.1145\/3563766.3564089","type":"proceedings-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T16:29:31Z","timestamp":1668443371000},"page":"38-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Reflections on trusting distributed trust"],"prefix":"10.1145","author":[{"given":"Emma","family":"Dauterman","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"Vivian","family":"Fang","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Natacha","family":"Crooks","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Project update and new name for ISRG Prio services: Introducing Divvi Up","author":"Aas John","year":"2021","unstructured":"John Aas . Project update and new name for ISRG Prio services: Introducing Divvi Up , 2021 . https:\/\/divviup.org\/blog\/prio-services-update\/. John Aas. Project update and new name for ISRG Prio services: Introducing Divvi Up, 2021. https:\/\/divviup.org\/blog\/prio-services-update\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_8"},{"key":"e_1_3_2_1_3_1","unstructured":"Alchemy. https:\/\/www.alchemy.com\/.  Alchemy. https:\/\/www.alchemy.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon Web Services. Aws nitro enclaves. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/.  Amazon Web Services. Aws nitro enclaves. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security","author":"Andersen Michael P","year":"2019","unstructured":"Michael P Andersen , Sam Kumar , Moustafa AbdelBaky , Gabe Fierro , John Kolb , Hyung-Sin Kim , David E Culler , and Raluca Ada Popa . WAVE : A decentralized authorization framework with transitive delegation . In USENIX Security , 2019 . Michael P Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E Culler, and Raluca Ada Popa. WAVE: A decentralized authorization framework with transitive delegation. In USENIX Security, 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_7_1","volume-title":"Exposure notification privacy-preserving analytics (ENPA) white paper","author":"Google Apple","year":"2021","unstructured":"Apple and Google . Exposure notification privacy-preserving analytics (ENPA) white paper , 2021 . https:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ENPA_White_Paper.pdf. Apple and Google. Exposure notification privacy-preserving analytics (ENPA) white paper, 2021. https:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ENPA_White_Paper.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_10_1","unstructured":"Blockdaemon. https:\/\/blockdaemon.com\/.  Blockdaemon. https:\/\/blockdaemon.com\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00048"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX WOOT","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . Software grand exposure: SGX cache attacks are practical . In USENIX WOOT , 2017 . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. Software grand exposure: SGX cache attacks are practical. In USENIX WOOT, 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"OSDI","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , Practical byzantine fault tolerance . In OSDI , 1999 . Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, 1999."},{"key":"e_1_3_2_1_16_1","volume-title":"CCS","author":"Chase Melissa","year":"2019","unstructured":"Melissa Chase , Apoorvaa Deshpande , Esha Ghosh , and Harjasleen Malvai . Seemless : Secure end-to-end encrypted messaging with less trust . In CCS , 2019 . Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, and Harjasleen Malvai. Seemless: Secure end-to-end encrypted messaging with less trust. In CCS, 2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_18_1","volume-title":"SGXPECTRE: Stealing Intel secrets from SGX enclaves via speculative execution","author":"Chen Guoxing","year":"2019","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H Lai . SGXPECTRE: Stealing Intel secrets from SGX enclaves via speculative execution . In IEEE EuroS &P, 2019 . Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H Lai. SGXPECTRE: Stealing Intel secrets from SGX enclaves via speculative execution. In IEEE EuroS&P, 2019."},{"key":"e_1_3_2_1_19_1","volume-title":"NSDI","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh . Prio : Private, robust, and scalable computation of aggregate statistics . In NSDI , 2017 . Henry Corrigan-Gibbs and Dan Boneh. Prio: Private, robust, and scalable computation of aggregate statistics. In NSDI, 2017."},{"key":"e_1_3_2_1_20_1","volume-title":"Riposte: An anonymous messaging system handling millions of users","author":"Corrigan-Gibbs Henry","year":"2015","unstructured":"Henry Corrigan-Gibbs , Dan Boneh , and David Mazi\u00e8res . Riposte: An anonymous messaging system handling millions of users . In IEEE S &P, 2015 . Henry Corrigan-Gibbs, Dan Boneh, and David Mazi\u00e8res. Riposte: An anonymous messaging system handling millions of users. In IEEE S&P, 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . Sanctum : Minimal hardware extensions for strong software isolation . In USENIX Security , 2016 . Victor Costan, Ilia Lebedev, and Srinivas Devadas. Sanctum: Minimal hardware extensions for strong software isolation. In USENIX Security, 2016."},{"key":"e_1_3_2_1_22_1","volume-title":"OSDI","author":"Dauterman Emma","year":"2020","unstructured":"Emma Dauterman , Henry Corrigan-Gibbs , and David Mazi\u00e8res . SafetyPin : Encrypted backups with Human-Memorable secrets . In OSDI , 2020 . Emma Dauterman, Henry Corrigan-Gibbs, and David Mazi\u00e8res. SafetyPin: Encrypted backups with Human-Memorable secrets. In OSDI, 2020."},{"key":"e_1_3_2_1_23_1","volume-title":"OSDI","author":"Dauterman Emma","year":"2020","unstructured":"Emma Dauterman , Eric Feng , Ellen Luo , Raluca Ada Popa , and Ion Stoica . DORY : An encrypted search system with distributed trust . In OSDI , 2020 . Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica. DORY: An encrypted search system with distributed trust. In OSDI, 2020."},{"key":"e_1_3_2_1_24_1","volume-title":"Raluca Ada Popa, and Ion Stoica. Waldo: A private time-series database from function secret sharing","author":"Dauterman Emma","year":"2022","unstructured":"Emma Dauterman , Mayank Rathee , Raluca Ada Popa, and Ion Stoica. Waldo: A private time-series database from function secret sharing . In IEEE S &P, 2022 . Emma Dauterman, Mayank Rathee, Raluca Ada Popa, and Ion Stoica. Waldo: A private time-series database from function secret sharing. In IEEE S&P, 2022."},{"key":"e_1_3_2_1_25_1","article-title":"speculative byzantine fault tolerance with minimum cost","author":"Duan Sisi","year":"2014","unstructured":"Sisi Duan , Sean Peisert , and Karl N Levitt . hbft : speculative byzantine fault tolerance with minimum cost . IEEE Transactions on Dependable and Secure Computing , 2014 . Sisi Duan, Sean Peisert, and Karl N Levitt. hbft: speculative byzantine fault tolerance with minimum cost. IEEE Transactions on Dependable and Secure Computing, 2014.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_26_1","unstructured":"Emscripten. https:\/\/emscripten.org.  Emscripten. https:\/\/emscripten.org."},{"key":"e_1_3_2_1_27_1","volume-title":"Next steps in privacy-preserving telemetry with Prio","author":"Englehardt Steven","year":"2019","unstructured":"Steven Englehardt . Next steps in privacy-preserving telemetry with Prio , 2019 . https:\/\/blog.mozilla.org\/security\/2019\/06\/06\/next-steps-in-privacy-preserving-telemetry-with-prio\/. Steven Englehardt. Next steps in privacy-preserving telemetry with Prio, 2019. https:\/\/blog.mozilla.org\/security\/2019\/06\/06\/next-steps-in-privacy-preserving-telemetry-with-prio\/."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian , Henry Corrigan-Gibbs , Matei Zaharia , and Dan Boneh . Express : Lowering the cost of metadata-hiding communication with cryptographic privacy . In USENIX Security , 2021 . Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh. Express: Lowering the cost of metadata-hiding communication with cryptographic privacy. In USENIX Security, 2021."},{"key":"e_1_3_2_1_29_1","unstructured":"Figment. https:\/\/www.figment.io\/.  Figment. https:\/\/www.figment.io\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Fireblocks. https:\/\/www.fireblocks.com\/platforms\/mpc-wallet\/.  Fireblocks. https:\/\/www.fireblocks.com\/platforms\/mpc-wallet\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Gemini. Cold storage keys & crypto: How Gemini keeps assets safe. https:\/\/www.gemini.com\/blog\/cold-storage-keys-crypto-how-gemini-keeps-assets-safe.  Gemini. Cold storage keys & crypto: How Gemini keeps assets safe. https:\/\/www.gemini.com\/blog\/cold-storage-keys-crypto-how-gemini-keeps-assets-safe."},{"key":"e_1_3_2_1_32_1","volume-title":"Exposure notifications private analytics: Lessons learned from running secure MPC at scale","author":"Geoghegan Tim","year":"2022","unstructured":"Tim Geoghegan . Exposure notifications private analytics: Lessons learned from running secure MPC at scale , 2022 . https:\/\/divviup.org\/blog\/lessons-from-running-mpc-at-scale\/. Tim Geoghegan. Exposure notifications private analytics: Lessons learned from running secure MPC at scale, 2022. https:\/\/divviup.org\/blog\/lessons-from-running-mpc-at-scale\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Real World Crypto","author":"Geoghegan Tim","year":"2022","unstructured":"Tim Geoghegan , Mariana Raykova , and Frederic Jacobs . Exposure notifications private analytics . In Real World Crypto , 2022 . Tim Geoghegan, Mariana Raykova, and Frederic Jacobs. Exposure notifications private analytics. In Real World Crypto, 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"STOC.","author":"Goldreich Oded","year":"1987","unstructured":"Oded Goldreich , Silvio Micali , and Avi Wigderson . How to play any mental game, or a completeness theorem for protocols with honest majority . In STOC. 1987 . Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In STOC. 1987."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_3_2_1_37_1","volume-title":"IEEE DSN","author":"Gueta Guy Golan","year":"2019","unstructured":"Guy Golan Gueta , Ittai Abraham , Shelly Grossman , Dahlia Malkhi , Benny Pinkas , Michael Reiter , Dragos-Adrian Seredinschi , Orr Tamir , and Alin Tomescu . Sbft : a scalable and decentralized trust infrastructure . In IEEE DSN , 2019 . Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. Sbft: a scalable and decentralized trust infrastructure. In IEEE DSN, 2019."},{"key":"e_1_3_2_1_38_1","volume-title":"NSDI","author":"Gupta Trinabh","year":"2016","unstructured":"Trinabh Gupta , Natacha Crooks , Whitney Mulhern , Srinath Setty , Lorenzo Alvisi , and Michael Walfish . Scalable and private media consumption with Popcorn . In NSDI , 2016 . Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. Scalable and private media consumption with Popcorn. In NSDI, 2016."},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX ATC","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . High-resolution side channels for untrusted operating systems . In USENIX ATC , 2017 . Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. High-resolution side channels for untrusted operating systems. In USENIX ATC, 2017."},{"key":"e_1_3_2_1_40_1","volume-title":"Software distribution transparency and auditability. arXiv preprint arXiv:1711.07278","author":"Hof Benjamin","year":"2017","unstructured":"Benjamin Hof and Georg Carle . Software distribution transparency and auditability. arXiv preprint arXiv:1711.07278 , 2017 . Benjamin Hof and Georg Carle. Software distribution transparency and auditability. arXiv preprint arXiv:1711.07278, 2017."},{"key":"e_1_3_2_1_41_1","volume-title":"Seung Jin Yang, and Raluca Ada Popa. Merkle2: A low-latency transparency log system","author":"Hu Yuncong","year":"2021","unstructured":"Yuncong Hu , Kian Hooshmand , Harika Kalidhindi , Seung Jin Yang, and Raluca Ada Popa. Merkle2: A low-latency transparency log system . In IEEE S &P, 2021 . Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, and Raluca Ada Popa. Merkle2: A low-latency transparency log system. In IEEE S&P, 2021."},{"key":"e_1_3_2_1_42_1","unstructured":"ISRG. Introducing ISRG Prio services for privacy respecting metrics. https:\/\/www.abetterinternet.org\/post\/introducing-prio-services\/.  ISRG. Introducing ISRG Prio services for privacy respecting metrics. https:\/\/www.abetterinternet.org\/post\/introducing-prio-services\/."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX ATC","author":"Jangda Abhinav","year":"2019","unstructured":"Abhinav Jangda , Bobby Powers , Emery D Berger , and Arjun Guha . Not so fast: Analyzing the performance of WebAssembly vs. native code . In USENIX ATC , 2019 . Abhinav Jangda, Bobby Powers, Emery D Berger, and Arjun Guha. Not so fast: Analyzing the performance of WebAssembly vs. native code. In USENIX ATC, 2019."},{"key":"e_1_3_2_1_44_1","volume-title":"Internet-Draft","author":"Kinnear Eric","year":"2021","unstructured":"Eric Kinnear , Patrick McManus , Tommy Pauly , and Christopher A Wood . Oblivious DNS over HTTPS. Internet Engineering Task Force , Internet-Draft , 2021 . https:\/\/www.ietf.org\/archive\/id\/draft-pauly-dprive-oblivious-doh-04.html. Eric Kinnear, Patrick McManus, Tommy Pauly, and Christopher A Wood. Oblivious DNS over HTTPS. Internet Engineering Task Force, Internet-Draft, 2021. https:\/\/www.ietf.org\/archive\/id\/draft-pauly-dprive-oblivious-doh-04.html."},{"key":"e_1_3_2_1_45_1","unstructured":"Knox. Knox custody. https:\/\/www.knoxcustody.com\/security.  Knox. Knox custody. https:\/\/www.knoxcustody.com\/security."},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security","author":"Kogan Dmitry","year":"2021","unstructured":"Dmitry Kogan and Henry Corrigan-Gibbs . Private blocklist lookups with checklist . In USENIX Security , 2021 . Dmitry Kogan and Henry Corrigan-Gibbs. Private blocklist lookups with checklist. In USENIX Security, 2021."},{"key":"e_1_3_2_1_47_1","volume-title":"ACM TOCS","author":"Kotla Ramakrishna","year":"2010","unstructured":"Ramakrishna Kotla , Lorenzo Alvisi , Mike Dahlin , Allen Clement , and Edmund Wong . Zyzzyva : Speculative byzantine fault tolerance . ACM TOCS , 2010 . Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. Zyzzyva: Speculative byzantine fault tolerance. ACM TOCS, 2010."},{"key":"e_1_3_2_1_48_1","volume-title":"SOSP","author":"Kwon Albert","year":"2017","unstructured":"Albert Kwon , Henry Corrigan-Gibbs , Srinivas Devadas , and Bryan Ford . Atom : Horizontally scaling strong anonymity . In SOSP , 2017 . Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, and Bryan Ford. Atom: Horizontally scaling strong anonymity. In SOSP, 2017."},{"key":"e_1_3_2_1_49_1","volume-title":"PoPETs","author":"Kwon Albert Hyukjae","year":"2016","unstructured":"Albert Hyukjae Kwon , David Lazar , Srinivas Devadas , and Bryan Ford . Riffle : An efficient communication system with strong anonymity . In PoPETs , 2016 . Albert Hyukjae Kwon, David Lazar, Srinivas Devadas, and Bryan Ford. Riffle: An efficient communication system with strong anonymity. In PoPETs, 2016."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24100-0_22"},{"key":"e_1_3_2_1_51_1","volume-title":"Internet Engineering Task Force","author":"Langley Adam","year":"2013","unstructured":"Adam Langley , Emilia Kasper , and Ben Laurie . Certificate transparency . Internet Engineering Task Force , 2013 . https:\/\/tools.ietf.org\/html\/rfc6962. Adam Langley, Emilia Kasper, and Ben Laurie. Certificate transparency. Internet Engineering Task Force, 2013. https:\/\/tools.ietf.org\/html\/rfc6962."},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee , Dongha Jung , Ian T Fang , Chia-Che Tsai , and Raluca Ada Popa . An off-chip attack on hardware enclaves via the memory bus . In USENIX Security , 2020 . Dayeol Lee, Dongha Jung, Ian T Fang, Chia-Che Tsai, and Raluca Ada Popa. An off-chip attack on hardware enclaves via the memory bus. In USENIX Security, 2020."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX Security","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In USENIX Security , 2017 . Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In USENIX Security, 2017."},{"key":"e_1_3_2_1_55_1","unstructured":"libBLS: a C++ library for BLS threshold signatures. https:\/\/github.com\/skalenetwork\/libBLS.  libBLS: a C++ library for BLS threshold signatures. https:\/\/github.com\/skalenetwork\/libBLS."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354225"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_58_1","volume-title":"USENIX Security","author":"Melara Marcela S","year":"2015","unstructured":"Marcela S Melara , Aaron Blankstein , Joseph Bonneau , Edward W Felten , and Michael J Freedman . CONIKS : Bringing key transparency to end users . In USENIX Security , 2015 . Marcela S Melara, Aaron Blankstein, Joseph Bonneau, Edward W Felten, and Michael J Freedman. CONIKS: Bringing key transparency to end users. In USENIX Security, 2015."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_60_1","volume-title":"Privacy-enhancing technologies and building for the future","author":"Mudd Graham","year":"2022","unstructured":"Graham Mudd . Privacy-enhancing technologies and building for the future , 2022 . https:\/\/www.facebook.com\/business\/news\/building-for-the-future. Graham Mudd. Privacy-enhancing technologies and building for the future, 2022. https:\/\/www.facebook.com\/business\/news\/building-for-the-future."},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX Security","author":"Nikitin Kirill","year":"2017","unstructured":"Kirill Nikitin , Eleftherios Kokoris-Kogias , Philipp Jovanovic , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Justin Cappos , and Bryan Ford . CHAINIAC : Proactive Software-Update transparency via collectively signed skipchains and verified builds . In USENIX Security , 2017 . Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. CHAINIAC: Proactive Software-Update transparency via collectively signed skipchains and verified builds. In USENIX Security, 2017."},{"key":"e_1_3_2_1_62_1","unstructured":"Node.js. https:\/\/nodejs.org.  Node.js. https:\/\/nodejs.org."},{"key":"e_1_3_2_1_63_1","unstructured":"Paxos. https:\/\/paxos.com\/crypto-brokerage\/.  Paxos. https:\/\/paxos.com\/crypto-brokerage\/."},{"key":"e_1_3_2_1_64_1","volume-title":"USENIX Security","author":"Poddar Rishabh","year":"2021","unstructured":"Rishabh Poddar , Sukrit Kalra , Avishay Yanai , Ryan Deng , Raluca Ada Popa , and Joseph M Hellerstein . Senate : A maliciously-secure MPC platform for collaborative analytics . In USENIX Security , 2021 . Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, and Joseph M Hellerstein. Senate: A maliciously-secure MPC platform for collaborative analytics. In USENIX Security, 2021."},{"key":"e_1_3_2_1_65_1","volume-title":"Crosstalk: Speculative data leaks across cores are real","author":"Ragab Hany","year":"2021","unstructured":"Hany Ragab , Alyssa Milburn , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . Crosstalk: Speculative data leaks across cores are real . In IEEE S &P, 2021 . Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. Crosstalk: Speculative data leaks across cores are real. In IEEE S&P, 2021."},{"key":"e_1_3_2_1_66_1","volume-title":"Real World Crypto, 2022","author":"Reyes James","year":"2022","unstructured":"James Reyes . Building the next generation of digital advertising with mpc . In Real World Crypto, 2022 . https:\/\/iacr.org\/submit\/files\/slides\/ 2022 \/rwc\/rwc2022\/104\/slides.pdf. James Reyes. Building the next generation of digital advertising with mpc. In Real World Crypto, 2022. https:\/\/iacr.org\/submit\/files\/slides\/2022\/rwc\/rwc2022\/104\/slides.pdf."},{"key":"e_1_3_2_1_67_1","unstructured":"Riddle and code. https:\/\/www.riddleandcode.com\/blog-posts\/hardware-security-modules-vs-secure-multi-party-computation-in-digital-asset-custody.  Riddle and code. https:\/\/www.riddleandcode.com\/blog-posts\/hardware-security-modules-vs-secure-multi-party-computation-in-digital-asset-custody."},{"key":"e_1_3_2_1_68_1","volume-title":"CCS","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz , Moritz Lipp , Daniel Moghimi , Jo Van Bulck , Julian Stecklina , Thomas Prescher , and Daniel Gruss . ZombieLoad : Cross-privilege-boundary data sampling . In CCS , 2019 . Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. In CCS, 2019."},{"key":"e_1_3_2_1_69_1","volume-title":"Malware guard extension: Using SGX to conceal cache attacks","author":"Schwarz Michael","year":"2017","unstructured":"Michael Schwarz , Samuel Weiser , Daniel Gruss , Cl\u00e9mentine Maurice , and Stefan Mangard . Malware guard extension: Using SGX to conceal cache attacks . In DIMVA. Springer , 2017 . Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. Malware guard extension: Using SGX to conceal cache attacks. In DIMVA. Springer, 2017."},{"key":"e_1_3_2_1_70_1","unstructured":"Sepior. https:\/\/sepior.com\/products\/advanced-mpc-wallet.  Sepior. https:\/\/sepior.com\/products\/advanced-mpc-wallet."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0085"},{"key":"e_1_3_2_1_73_1","volume-title":"CCS","author":"Tomescu Alin","year":"2019","unstructured":"Alin Tomescu , Vivek Bhupatiraju , Dimitrios Papadopoulos , Charalampos Papamanthou , Nikos Triandopoulos , and Srinivas Devadas . Transparency logs via append-only authenticated dictionaries . In CCS , 2019 . Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, and Srinivas Devadas. Transparency logs via append-only authenticated dictionaries. In CCS, 2019."},{"key":"e_1_3_2_1_74_1","unstructured":"Trillian. https:\/\/github.com\/google\/trillian.  Trillian. https:\/\/github.com\/google\/trillian."},{"key":"e_1_3_2_1_75_1","unstructured":"Unbound Security. The Unbound CORE MPC key vault.  Unbound Security. The Unbound CORE MPC key vault."},{"key":"e_1_3_2_1_76_1","volume-title":"USENIX Security","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . Foreshadow : Extracting the keys to the Intel SGX kingdom with transient out-of-order execution . In USENIX Security , 2018 . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In USENIX Security, 2018."},{"key":"e_1_3_2_1_77_1","volume-title":"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck , Daniel Moghimi , Michael Schwarz , Moritz Lipp , Marina Minkin , Daniel Genkin , Yarom Yuval , Berk Sunar , Daniel Gruss , and Frank Piessens . LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection . In IEEE S &P, 2020 . Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In IEEE S&P, 2020."},{"key":"e_1_3_2_1_78_1","volume-title":"USENIX Security","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In USENIX Security , 2017 . Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In USENIX Security, 2017."},{"key":"e_1_3_2_1_79_1","volume-title":"RIDL: Rogue in-flight data load","author":"Schaik Stephan Van","year":"2019","unstructured":"Stephan Van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . RIDL: Rogue in-flight data load . In IEEE S &P, 2019 . Stephan Van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue in-flight data load. In IEEE S&P, 2019."},{"key":"e_1_3_2_1_80_1","volume-title":"CacheOut: Leaking data on Intel CPUs via cache evictions","author":"van Schaik Stephan","year":"2021","unstructured":"Stephan van Schaik , Marina Minkin , Andrew Kwong , Daniel Genkin , and Yuval Yarom . CacheOut: Leaking data on Intel CPUs via cache evictions . In IEEE S &P, 2021 . Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, and Yuval Yarom. CacheOut: Leaking data on Intel CPUs via cache evictions. In IEEE S&P, 2021."},{"key":"e_1_3_2_1_81_1","volume-title":"Improving DNS privacy with oblivious DoH in 1.1.1.1","author":"Verma Tanya","year":"2020","unstructured":"Tanya Verma and Sudheesh Signanamalla . Improving DNS privacy with oblivious DoH in 1.1.1.1 , 2020 . https:\/\/blog.cloudflare.com\/oblivious-dns\/. Tanya Verma and Sudheesh Signanamalla. Improving DNS privacy with oblivious DoH in 1.1.1.1, 2020. https:\/\/blog.cloudflare.com\/oblivious-dns\/."},{"key":"e_1_3_2_1_82_1","volume-title":"NSDI","author":"Wang Frank","year":"2017","unstructured":"Frank Wang , Catherine Yun , Shafi Goldwasser , Vinod Vaikuntanathan , and Matei Zaharia . Splinter : Practical private queries on public data . In NSDI , 2017 . Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, and Matei Zaharia. Splinter: Practical private queries on public data. In NSDI, 2017."},{"key":"e_1_3_2_1_83_1","unstructured":"WebAssembly. https:\/\/webassembly.org.  WebAssembly. https:\/\/webassembly.org."},{"key":"e_1_3_2_1_84_1","volume-title":"OSDI","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . Dissent in numbers: Making strong anonymity scale . In OSDI , 2012 . David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. Dissent in numbers: Making strong anonymity scale. In OSDI, 2012."},{"key":"e_1_3_2_1_85_1","volume-title":"Controlled-channel attacks: Deterministic side channels for untrusted operating systems","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . Controlled-channel attacks: Deterministic side channels for untrusted operating systems . In IEEE S &P, 2015 . Yuanzhong Xu, Weidong Cui, and Marcus Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE S&P, 2015."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_87_1","volume-title":"Native client: A sandbox for portable, untrusted x86 native code","author":"Yee Bennet","year":"2009","unstructured":"Bennet Yee , David Sehr , Gregory Dardyk , J Bradley Chen , Robert Muth , Tavis Ormandy , Shiki Okasaka , Neha Narula , and Nicholas Fullagar . Native client: A sandbox for portable, untrusted x86 native code . In IEEE S &P, 2009 . Bennet Yee, David Sehr, Gregory Dardyk, J Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In IEEE S&P, 2009."},{"key":"e_1_3_2_1_88_1","volume-title":"ACM PODC","author":"Yin Maofan","year":"2019","unstructured":"Maofan Yin , Dahlia Malkhi , Michael K Reiter , Guy Golan Gueta , and Ittai Abraham . Hotstuff : BFT consensus with linearity and responsiveness . In ACM PODC , 2019 . Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. Hotstuff: BFT consensus with linearity and responsiveness. In ACM PODC, 2019."}],"event":{"name":"HotNets '22: The 21st ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Austin Texas","acronym":"HotNets '22"},"container-title":["Proceedings of the 21st ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563766.3564089","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563766.3564089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:50Z","timestamp":1750182530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563766.3564089"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":87,"alternative-id":["10.1145\/3563766.3564089","10.1145\/3563766"],"URL":"https:\/\/doi.org\/10.1145\/3563766.3564089","relation":{},"subject":[],"published":{"date-parts":[[2022,11,14]]},"assertion":[{"value":"2022-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}