{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:35Z","timestamp":1750219835044,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR001120C0088"],"award-info":[{"award-number":["HR001120C0088"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2224319"],"award-info":[{"award-number":["2224319"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"REAL@USC-Meta center"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589111","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6430-1819","authenticated-orcid":false,"given":"Rachit","family":"Rajat","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of Southern California, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5076-7706","authenticated-orcid":false,"given":"Yongqin","family":"Wang","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Southern California, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-6867","authenticated-orcid":false,"given":"Murali","family":"Annavaram","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Southern California, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Hopper Architecture the Next Generation of Accelerated Computing. https:\/\/nvidianews.nvidia.com\/news\/nvidia-announces-hopper-architecture-the-next-generation-of-accelerated-computing?ncid=em-anno-501708#cid=hpc06_em-anno_en-us. Accessed: 2022-04-13.  [n. d.]. Hopper Architecture the Next Generation of Accelerated Computing. https:\/\/nvidianews.nvidia.com\/news\/nvidia-announces-hopper-architecture-the-next-generation-of-accelerated-computing?ncid=em-anno-501708#cid=hpc06_em-anno_en-us. Accessed: 2022-04-13."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Nearly 70% of US smart speaker owners use Amazon Echo devices. https:\/\/techcrunch.com\/2020\/02\/10\/nearly-70-of-u-s-smart-speaker-owners-use-amazon-echo-devices\/. Accessed: 2022-04-18.  [n. d.]. Nearly 70% of US smart speaker owners use Amazon Echo devices. https:\/\/techcrunch.com\/2020\/02\/10\/nearly-70-of-u-s-smart-speaker-owners-use-amazon-echo-devices\/. Accessed: 2022-04-18."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Recommendations Figuring out how to bring unique joy to each member. https:\/\/research.netflix.com\/research-area\/recommendations. Accessed: 2022-04-18.  [n. d.]. Recommendations Figuring out how to bring unique joy to each member. https:\/\/research.netflix.com\/research-area\/recommendations. Accessed: 2022-04-18."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. What is Epoch in Machine Learning? https:\/\/www.simplilearn.com\/tutorials\/machine-learning-tutorial\/what-is-epoch-in-machine-learning. Accessed: 2023-02-19.  [n. d.]. What is Epoch in Machine Learning? https:\/\/www.simplilearn.com\/tutorials\/machine-learning-tutorial\/what-is-epoch-in-machine-learning. Accessed: 2023-02-19."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 44th Annual International Symposium on Computer Architecture","author":"Aga Shaizeen","year":"2017","unstructured":"Shaizeen Aga and Satish Narayanasamy . 2017 . InvisiMem: Smart Memory Defenses for Memory Bus Side Channel . In Proceedings of the 44th Annual International Symposium on Computer Architecture ( Toronto, ON, Canada) (ISCA '17). Association for Computing Machinery, New York, NY, USA, 94--106. Shaizeen Aga and Satish Narayanasamy. 2017. InvisiMem: Smart Memory Defenses for Memory Bus Side Channel. In Proceedings of the 44th Annual International Symposium on Computer Architecture (Toronto, ON, Canada) (ISCA '17). Association for Computing Machinery, New York, NY, USA, 94--106."},{"key":"e_1_3_2_1_7_1","volume-title":"OBLIVIATE: A Data Oblivious File System for Intel SGX. Network and Distributed Systems Security (NDSS) Symposium","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad , Kyungtae Kim , Muhammad Ihsanulhaq Sarfaraz , and Byoungyoung Lee . 2018 . OBLIVIATE: A Data Oblivious File System for Intel SGX. Network and Distributed Systems Security (NDSS) Symposium (2018). Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious File System for Intel SGX. Network and Distributed Systems Security (NDSS) Symposium (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080230"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474246"},{"key":"e_1_3_2_1_10_1","volume-title":"2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA).","author":"Cao Dingyuan","year":"2021","unstructured":"Dingyuan Cao , Mingzhe Zhang , Hang Lu , Xiaochun Ye , Dongrui Fan , Yuezhi Che , and Rujia Wang . 2021 . Streamline Ring ORAM Accesses through Spatial and Temporal Optimization . In 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA). Dingyuan Cao, Mingzhe Zhang, Hang Lu, Xiaochun Ye, Dongrui Fan, Yuezhi Che, and Rujia Wang. 2021. Streamline Ring ORAM Accesses through Spatial and Temporal Optimization. In 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_1_11_1","volume-title":"Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA).","author":"Che Yuezhi","year":"2020","unstructured":"Yuezhi Che and Rujia Wang . 2020 . Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). Yuezhi Che and Rujia Wang. 2020. Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA)."},{"volume-title":"d.]. Notes from the AI frontier: Insights from hundreds of use cases","author":"Chui Michael","key":"e_1_3_2_1_12_1","unstructured":"Michael Chui , James Manyika , Mehdi Miremadi , Nicolaus Henke , Rita Chung , Pieter Nel , and Sankalp Malhotra . [n. d.]. Notes from the AI frontier: Insights from hundreds of use cases . McKinsey Global Institute ( [n. d.]). Michael Chui, James Manyika, Mehdi Miremadi, Nicolaus Henke, Rita Chung, Pieter Nel, and Sankalp Malhotra. [n. d.]. Notes from the AI frontier: Insights from hundreds of use cases. McKinsey Global Institute ([n. d.])."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL)","author":"Conneau Alexis","year":"2020","unstructured":"Alexis Conneau and Kartikay Khandelwal . 2020 . Unsupervised Cross-lingual Representation Learning at Scale . Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL) (2020). Alexis Conneau and Kartikay Khandelwal. 2020. Unsupervised Cross-lingual Representation Learning at Scale. Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL) (2020)."},{"key":"e_1_3_2_1_14_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. (2016).  Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. (2016)."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning (ICML).","author":"Dowlin Nathan","year":"2016","unstructured":"Nathan Dowlin , Ran Gilad-Bachrach , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy . In Proceedings of the 33rd International Conference on International Conference on Machine Learning (ICML). Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33rd International Conference on International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"volume-title":"Probability and Random Processes for Electrical and Computer Engineers","author":"Gubner John A.","key":"e_1_3_2_1_20_1","unstructured":"John A. Gubner . 2006. Probability and Random Processes for Electrical and Computer Engineers . Cambridge University Press . John A. Gubner. 2006. Probability and Random Processes for Electrical and Computer Engineers. Cambridge University Press."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings on the 54th International Symposium on Microarchitecture (MICRO)","author":"Hashemi Hanieh","year":"2021","unstructured":"Hanieh Hashemi , Yongqin Wang , and Murali Annavaram . 2021 . Darknight: A data privacy scheme for training and inference of deep neural networks . Proceedings on the 54th International Symposium on Microarchitecture (MICRO) (2021). Hanieh Hashemi, Yongqin Wang, and Murali Annavaram. 2021. Darknight: A data privacy scheme for training and inference of deep neural networks. Proceedings on the 54th International Symposium on Microarchitecture (MICRO) (2021)."},{"key":"e_1_3_2_1_22_1","unstructured":"Hanieh Hashemi Wenjie Xiong Liu Ke Kiwan Maeng Murali Annavaram G. Edward Suh and Hsien-Hsin S. Lee. 2022. Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems. (2022). arXiv:2212.06264 [cs.CE]  Hanieh Hashemi Wenjie Xiong Liu Ke Kiwan Maeng Murali Annavaram G. Edward Suh and Hsien-Hsin S. Lee. 2022. Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems. (2022). arXiv:2212.06264 [cs.CE]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI).","author":"Jin Rong","year":"2017","unstructured":"Rong Jin . 2017 . Deep Learning at Alibaba . In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI). Rong Jin. 2017. Deep Learning at Alibaba. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI)."},{"key":"e_1_3_2_1_25_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium.","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","volume-title":"Franz Gregor, Sergei Arnautov, Pramod Bhatotia, and Christof Fetzer.","author":"Kunkel Roland","year":"2019","unstructured":"Roland Kunkel , Do Le Quoc , Franz Gregor, Sergei Arnautov, Pramod Bhatotia, and Christof Fetzer. 2019 . TensorSCONE: A Secure TensorFlow Framework using Intel SGX. arXiv preprint arXiv:1902.04413 [cs.CR] (2019). Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, and Christof Fetzer. 2019. TensorSCONE: A Secure TensorFlow Framework using Intel SGX. arXiv preprint arXiv:1902.04413 [cs.CR] (2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"Cross-lingual Language Model Pretraining. 33rd Conference on Neural Information Processing Systems (NeurIPS)","author":"Lample Guillaume","year":"2019","unstructured":"Guillaume Lample and Alexis Conneau . 2019 . Cross-lingual Language Model Pretraining. 33rd Conference on Neural Information Processing Systems (NeurIPS) (2019). Guillaume Lample and Alexis Conneau. 2019. Cross-lingual Language Model Pretraining. 33rd Conference on Neural Information Processing Systems (NeurIPS) (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"Fat-trees: Universal networks for hardware-efficient super-computing","author":"Leiserson C. E.","year":"1985","unstructured":"C. E. Leiserson . 1985 . Fat-trees: Universal networks for hardware-efficient super-computing . IEEE Trans. Comput. C- 34, 10 (1985). C. E. Leiserson. 1985. Fat-trees: Universal networks for hardware-efficient super-computing. IEEE Trans. Comput. C-34, 10 (1985)."},{"volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Liu Jian","key":"e_1_3_2_1_29_1","unstructured":"Jian Liu , Mika Juuti , Yao Lu , and N. Asokan . 2017. Oblivious Neural Network Predictions via MiniONN Transformations . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS). Jian Liu, Mika Juuti, Yao Lu, and N. Asokan. 2017. Oblivious Neural Network Predictions via MiniONN Transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_30_1","volume-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv preprint arXiv:1907.11692 [cs.CL]","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu , Myle Ott , Naman Goyal , Jingfei Du , Mandar Joshi , Danqi Chen , Omer Levy , Mike Lewis , Luke Zettlemoyer , and Veselin Stoyanov . 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv preprint arXiv:1907.11692 [cs.CL] ( 2019 ). arXiv:1907.11692 [cs.CL] Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv preprint arXiv:1907.11692 [cs.CL] (2019). arXiv:1907.11692 [cs.CL]"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_32_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP).","author":"Mohassel Payman","year":"2017","unstructured":"Payman Mohassel and Yupeng Zhang . 2017 . SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP). Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Dheevatsa Mudigere Yuchen Hao Jianyu Huang Zhihao Jia Andrew Tulloch Srinivas Sridharan Xing Liu Mustafa Ozdal Jade Nie Jongsoo Park Liang Luo Jie Amy Yang Leon Gao Dmytro Ivchenko Aarti Basant Yuxi Hu Jiyan Yang Ehsan K. Ardestani Xiaodong Wang Rakesh Komuravelli Ching-Hsiang Chu Serhat Yilmaz Huayu Li Jiyuan Qian Zhuobo Feng Yinbin Ma Junjie Yang Ellie Wen Hong Li Lin Yang Chonglin Sun Whitney Zhao Dimitry Melts Krishna Dhulipala KR Kishore Tyler Graf Assaf Eisenman Kiran Kumar Matam Adi Gangidi Guoqiang Jerry Chen Manoj Krishnan Avinash Nayak Krishnakumar Nair Bharath Muthiah Mahmoud khorashadi Pallab Bhattacharya Petr Lapukhov Maxim Naumov Ajit Mathews Lin Qiao Mikhail Smelyanskiy Bill Jia and Vijay Rao. 2021. Software-Hardware Co-design for Fast and Scalable Training of Deep Learning Recommendation Models. arXiv preprint arXiv:2104.05158 [cs.DC] (2021).  Dheevatsa Mudigere Yuchen Hao Jianyu Huang Zhihao Jia Andrew Tulloch Srinivas Sridharan Xing Liu Mustafa Ozdal Jade Nie Jongsoo Park Liang Luo Jie Amy Yang Leon Gao Dmytro Ivchenko Aarti Basant Yuxi Hu Jiyan Yang Ehsan K. Ardestani Xiaodong Wang Rakesh Komuravelli Ching-Hsiang Chu Serhat Yilmaz Huayu Li Jiyuan Qian Zhuobo Feng Yinbin Ma Junjie Yang Ellie Wen Hong Li Lin Yang Chonglin Sun Whitney Zhao Dimitry Melts Krishna Dhulipala KR Kishore Tyler Graf Assaf Eisenman Kiran Kumar Matam Adi Gangidi Guoqiang Jerry Chen Manoj Krishnan Avinash Nayak Krishnakumar Nair Bharath Muthiah Mahmoud khorashadi Pallab Bhattacharya Petr Lapukhov Maxim Naumov Ajit Mathews Lin Qiao Mikhail Smelyanskiy Bill Jia and Vijay Rao. 2021. Software-Hardware Co-design for Fast and Scalable Training of Deep Learning Recommendation Models. arXiv preprint arXiv:2104.05158 [cs.DC] (2021).","DOI":"10.1145\/3470496.3533727"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00021"},{"key":"e_1_3_2_1_35_1","unstructured":"Maxim Naumov Dheevatsa Mudigere Hao-Jun Michael Shi Jianyu Huang Narayanan Sundaraman Jongsoo Park Xiaodong Wang Udit Gupta Carole-Jean Wu Alisson G. Azzolini Dmytro Dzhulgakov Andrey Mallevich Ilia Cherniavskii Yinghai Lu Raghuraman Krishnamoorthi Ansha Yu Volodymyr Kondratenko Stephanie Pereira Xianjie Chen Wenlin Chen Vijay Rao Bill Jia Liang Xiong and Misha Smelyanskiy. 2019. Deep Learning Recommendation Model for Personalization and Recommendation Systems. arXiv preprint arXiv:1906.00091 [cs.IR] (2019).  Maxim Naumov Dheevatsa Mudigere Hao-Jun Michael Shi Jianyu Huang Narayanan Sundaraman Jongsoo Park Xiaodong Wang Udit Gupta Carole-Jean Wu Alisson G. Azzolini Dmytro Dzhulgakov Andrey Mallevich Ilia Cherniavskii Yinghai Lu Raghuraman Krishnamoorthi Ansha Yu Volodymyr Kondratenko Stephanie Pereira Xianjie Chen Wenlin Chen Vijay Rao Bill Jia Liang Xiong and Misha Smelyanskiy. 2019. Deep Learning Recommendation Model for Personalization and Recommendation Systems. arXiv preprint arXiv:1906.00091 [cs.IR] (2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2011.7477494"},{"key":"e_1_3_2_1_37_1","volume-title":"PageORAM: An Efficient DRAM Page Aware ORAM Strategy. In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO).","author":"Rajat Rachit","year":"2022","unstructured":"Rachit Rajat , Yongqin Wang , and Murali Annavaram . 2022 . PageORAM: An Efficient DRAM Page Aware ORAM Strategy. In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO). Rachit Rajat, Yongqin Wang, and Murali Annavaram. 2022. PageORAM: An Efficient DRAM Page Aware ORAM Strategy. In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO)."},{"key":"e_1_3_2_1_38_1","volume-title":"24th USENIX Security Symposium.","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten van Dijk , and Srinivas Devadas . 2015 . Constants Count: Practical Improvements to Oblivious RAM . In 24th USENIX Security Symposium. Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In 24th USENIX Security Symposium."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485971"},{"key":"e_1_3_2_1_40_1","volume-title":"Network and Distributed Systems Security (NDSS) Symposium","author":"Sasy Sajin","year":"2018","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher Fletcher . 2018 . ZeroTrace: Oblivious Memory Primitives from Intel SGX . Network and Distributed Systems Security (NDSS) Symposium (2018). Sajin Sasy, Sergey Gorbunov, and Christopher Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. Network and Distributed Systems Security (NDSS) Symposium (2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_43_1","volume-title":"Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. arXiv preprint arXiv:1806.03287","author":"Tram\u00e8r Florian","year":"2019","unstructured":"Florian Tram\u00e8r and Dan Boneh . 2019 . Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. arXiv preprint arXiv:1806.03287 (2019). arXiv:1806.03287 [stat.ML] Florian Tram\u00e8r and Dan Boneh. 2019. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. arXiv preprint arXiv:1806.03287 (2019). arXiv:1806.03287 [stat.ML]"},{"key":"e_1_3_2_1_44_1","volume-title":"Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos , Kapil Vaswani , and Rodrigo Bruno . 2018 . Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_45_1","unstructured":"Sameer Wagh Divya Gupta and Nishanth Chandran. 2018. SecureNN: Efficient and Private Neural Network Training. Cryptology ePrint Archive Paper 2018\/442.  Sameer Wagh Divya Gupta and Nishanth Chandran. 2018. SecureNN: Efficient and Private Neural Network Training. Cryptology ePrint Archive Paper 2018\/442."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219869"},{"key":"e_1_3_2_1_47_1","volume-title":"Cooperative Path-ORAM for Effective Memory Bandwidth Sharing in Server Settings. In 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA).","author":"Wang Rujia","year":"2017","unstructured":"Rujia Wang , Youtao Zhang , and Jun Yang . 2017 . Cooperative Path-ORAM for Effective Memory Bandwidth Sharing in Server Settings. In 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA). Rujia Wang, Youtao Zhang, and Jun Yang. 2017. Cooperative Path-ORAM for Effective Memory Bandwidth Sharing in Server Settings. In 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_1_48_1","unstructured":"Yongqin Wang Rachit Rajat and Murali Annavaram. 2022. MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference. arXiv:2209.13643 [cs.CR]  Yongqin Wang Rachit Rajat and Murali Annavaram. 2022. MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference. arXiv:2209.13643 [cs.CR]"},{"volume-title":"Characterization of MPC-based Private Inferences for Transformer-based Models. In 2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).","author":"Wang Yongqin","key":"e_1_3_2_1_49_1","unstructured":"Yongqin Wang , G. Edward Suh , Wenjie Xiong , Benjamin Lefaudeux , Brian Knott , Murali Annavaram , and Hsien-Hsin S. Lee . 2022 . Characterization of MPC-based Private Inferences for Transformer-based Models. In 2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). Yongqin Wang, G. Edward Suh, Wenjie Xiong, Benjamin Lefaudeux, Brian Knott, Murali Annavaram, and Hsien-Hsin S. Lee. 2022. Characterization of MPC-based Private Inferences for Transformer-based Models. In 2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In Proceedings of the 23rd USENIX Conference on Security Symposium. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Conference on Security Symposium."},{"key":"e_1_3_2_1_51_1","volume-title":"2015 ACM\/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).","author":"Yu Xiangyao","year":"2015","unstructured":"Xiangyao Yu , Syed Kamran Haider , Ling Ren , Christopher Fletcher , Albert Kwon , Marten van Dijk , and Srinivas Devadas . 2015 . PrORAM: Dynamic prefetcher for Oblivious RAM . In 2015 ACM\/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA). Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, and Srinivas Devadas. 2015. PrORAM: Dynamic prefetcher for Oblivious RAM. In 2015 ACM\/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA)."},{"key":"e_1_3_2_1_52_1","volume-title":"Shadow Block: Accelerating ORAM Accesses with Data Duplication. International Symposium on Microarchitecture","author":"Zhang Xian","year":"2018","unstructured":"Xian Zhang , Guangyu Sun , Peichen Xie , Chao Zhang , Yannan Liu , Lingxiao Wei , Qiang Xu , and Chun Jason Xue . 2018 . Shadow Block: Accelerating ORAM Accesses with Data Duplication. International Symposium on Microarchitecture (2018), 961--973. Xian Zhang, Guangyu Sun, Peichen Xie, Chao Zhang, Yannan Liu, Lingxiao Wei, Qiang Xu, and Chun Jason Xue. 2018. Shadow Block: Accelerating ORAM Accesses with Data Duplication. International Symposium on Microarchitecture (2018), 961--973."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 48th International Symposium on Microarchitecture (MICRO).","author":"Zhang Xian","year":"2015","unstructured":"Xian Zhang , Guangyu Sun , Chao Zhang , Weiqi Zhang , Yun Liang , Tao Wang , Yiran Chen , and Jia Di . 2015 . Fork Path: Improving Efficiency of ORAM by Removing Redundant Memory Accesses . In Proceedings of the 48th International Symposium on Microarchitecture (MICRO). Xian Zhang, Guangyu Sun, Chao Zhang, Weiqi Zhang, Yun Liang, Tao Wang, Yiran Chen, and Jia Di. 2015. Fork Path: Improving Efficiency of ORAM by Removing Redundant Memory Accesses. In Proceedings of the 48th International Symposium on Microarchitecture (MICRO)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358045"}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"],"location":"Orlando FL USA","acronym":"ISCA '23"},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:40Z","timestamp":1750178800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":54,"alternative-id":["10.1145\/3579371.3589111","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589111","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}