{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:10:04Z","timestamp":1756487404139,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"European Commission","doi-asserted-by":"publisher","award":["101092646,101016577,101092644"],"award-info":[{"award-number":["101092646,101016577,101092644"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["174223256"],"award-info":[{"award-number":["174223256"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629107","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"85-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SinClave"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9863-2297","authenticated-orcid":false,"given":"Franz","family":"Gregor","sequence":"first","affiliation":[{"name":"Scontain GmbH, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0768-6351","authenticated-orcid":false,"given":"Robert","family":"Krahn","sequence":"additional","affiliation":[{"name":"TU Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1433-0217","authenticated-orcid":false,"given":"Do Le","family":"Quoc","sequence":"additional","affiliation":[{"name":"Huawei Research, Germany and TU Dresden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8240-5420","authenticated-orcid":false,"given":"Christof","family":"Fetzer","sequence":"additional","affiliation":[{"name":"TU Dresden, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP).","author":"Anati Ittai","key":"e_1_3_2_1_1_1","unstructured":"Ittai Anati, Shay Gueron, P. Simon Johnson, and R. Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)."},{"key":"e_1_3_2_1_2_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L Stillwell, et al. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)."},{"key":"e_1_3_2_1_3_1","volume-title":"2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Bailleu Maurice","year":"2021","unstructured":"Maurice Bailleu, Dimitra Giantsidi, Vasilis Gavrielatos, Vijay Nagarajan, Pramod Bhatotia, et al. 2021. Avocado: A Secure {In-Memory} Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC 21)."},{"key":"e_1_3_2_1_4_1","volume-title":"Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS)","author":"Baumann Andrew","year":"2015","unstructured":"Andrew Baumann, Marcus Peinado, and Galen Hunt. 2015. Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS) (2015)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"e_1_3_2_1_6_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18)."},{"volume-title":"IEEE European Symposium on Security and Privacy (Euro S&P).","author":"Chen G.","key":"e_1_3_2_1_7_1","unstructured":"G. Chen, S. Chen, Y. Xiao, Y. Zhang, Z. Lin, and T. H. Lai. 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. In IEEE European Symposium on Security and Privacy (Euro S&P)."},{"key":"e_1_3_2_1_8_1","volume-title":"d.]","author":"Intel Corp. [n.","year":"2023","unstructured":"Intel Corp. [n. d.]. Gramine: A Linux-compatible Library OS for Multi-Process Applications. hhttps:\/\/github.com\/gramineproject\/gramine. Accessed: May 2023."},{"key":"e_1_3_2_1_9_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00075-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375726"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_22"},{"key":"e_1_3_2_1_14_1","volume-title":"Microsoft Azure Confidential Computing with Intel SGX. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/microsoft-azure-confidential-computing-with-intel-sgx.html","author":"Gordon James C","year":"2023","unstructured":"James C Gordon. 2018. Microsoft Azure Confidential Computing with Intel SGX. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/microsoft-azure-confidential-computing-with-intel-sgx.html. Accessed: May 2023."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00063"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and efficient cache side-channel protection using hardware transactional memory. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_1_17_1","volume-title":"Intel sha extensions--new instructions supporting the secure hash algorithm on intel architecture processor. Intel White Paper","author":"Gulley Sean","year":"2013","unstructured":"Sean Gulley, Vinodh Gopal, Kirk Yap, Wajdi Feghali, Jim Guilford, and Gil Wolrich. 2013. Intel sha extensions--new instructions supporting the secure hash algorithm on intel architecture processor. Intel White Paper (2013)."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/github.com\/bheisler\/criterion.rs","author":"Heisler Brook","year":"2023","unstructured":"Brook Heisler. 2021. Criterion.rs - Statistics-driven Microbenchmarking in Rust. https:\/\/github.com\/bheisler\/criterion.rs. Accessed: May 2023."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2020. Intel\u00ae 64 and ia-32 architectures software developer's manual. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/download\/intel-64-and-ia-32-architectures-sdm-volume-3d-system-programming-guide-part-4.html. Volume 3D: System programming Guide Part 4 (2020). Accessed: May 2023."},{"volume-title":"Intel SGX Linux(R) Driver. https:\/\/github.com\/intel\/linux-sgx-driver","year":"2023","key":"e_1_3_2_1_20_1","unstructured":"Intel. 2021. Intel SGX Linux(R) Driver. https:\/\/github.com\/intel\/linux-sgx-driver. Accessed: May 2023."},{"volume-title":"An introductory overview of the Intel TDX technology. Intel White Paper","author":"Intel Corporation","key":"e_1_3_2_1_21_1","unstructured":"Intel Corporation. 2020. An introductory overview of the Intel TDX technology. Intel White Paper. Intel Corporation."},{"key":"e_1_3_2_1_22_1","volume-title":"Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx","author":"Karnati Pratheek","year":"2023","unstructured":"Pratheek Karnati. 2018. Data-in-use protection on IBM Cloud using Intel SGX. https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx. Accessed: May 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425677"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3314129"},{"key":"e_1_3_2_1_27_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP).","author":"McKeen Frank","key":"e_1_3_2_1_29_1","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)."},{"key":"e_1_3_2_1_30_1","unstructured":"Ralph Charles Merkle. 1979. Secrecy authentication and public key systems. Stanford university."},{"key":"e_1_3_2_1_31_1","volume-title":"Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support. In IFIP Annual Conference on Data and Applications Security and Privacy.","author":"Ozga Wojciech","year":"2021","unstructured":"Wojciech Ozga, Do Le Quoc, and Christof Fetzer. 2021. Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support. In IFIP Annual Conference on Data and Applications Security and Privacy."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496680"},{"key":"e_1_3_2_1_33_1","volume-title":"On the secure hash algorithm family. Cryptography in context","author":"Penard Wouter","year":"2008","unstructured":"Wouter Penard and Tim van Werkhoven. 2008. On the secure hash algorithm family. Cryptography in context (2008)."},{"key":"e_1_3_2_1_34_1","volume-title":"SGX-LKL: Securing the Host OS Interface for Trusted Execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the Host OS Interface for Trusted Execution. arXiv preprint arXiv:1908.11143 (2019)."},{"key":"e_1_3_2_1_35_1","volume-title":"Secure hash standard (shs). Fips pub","author":"FIPS PUB.","year":"2012","unstructured":"FIPS PUB. 2012. Secure hash standard (shs). Fips pub (2012)."},{"volume-title":"Training a Classifier. https:\/\/pytorch.org\/tutorials\/beginner\/blitz\/cifar10_tutorial.html","year":"2023","key":"e_1_3_2_1_36_1","unstructured":"PyTorch. 2021. Training a Classifier. https:\/\/pytorch.org\/tutorials\/beginner\/blitz\/cifar10_tutorial.html. Accessed: May 2023."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425687"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing digital side-channels through obfuscated execution. In Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)","author":"Ren Ling","year":"2015","unstructured":"Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In Proceedings of the 24th USENIX Security Symposium (USENIX Security 15)."},{"key":"e_1_3_2_1_40_1","volume-title":"White Paper","author":"Sev-Snp AMD","year":"2020","unstructured":"AMD Sev-Snp. 2020. Strengthening VM isolation with integrity protection and more. White Paper, January (2020), 8."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_43_1","volume-title":"fast, small crypto using Rust. https:\/\/github.com\/briansmith\/ring","author":"Smith Brian","year":"2023","unstructured":"Brian Smith. 2021. Safe, fast, small crypto using Rust. https:\/\/github.com\/briansmith\/ring. Accessed: May 2023."},{"key":"e_1_3_2_1_44_1","volume-title":"Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas.","author":"Stefanov Emil","year":"2018","unstructured":"Emil Stefanov, Marten Van Dijk, Elaine Shi, T-H Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2018. Path oram: An extremely simple oblivious ram protocol. In Journal of the ACM (JACM)."},{"key":"e_1_3_2_1_45_1","volume-title":"Security Barrier Camera Demo. https:\/\/docs.openvinotoolkit.org\/2020.1\/_demos_security_barrier_camera_demo_README.html","author":"Toolkit OpenVino","year":"2023","unstructured":"OpenVino Toolkit. 2020. Security Barrier Camera Demo. https:\/\/docs.openvinotoolkit.org\/2020.1\/_demos_security_barrier_camera_demo_README.html. Accessed: May 2023."},{"key":"e_1_3_2_1_46_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In USENIX Annual Technical Conference (USENIXATC 17)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In USENIX Annual Technical Conference (USENIXATC 17)."},{"volume-title":"Python with Encrypted","author":"Scontain UG.","key":"e_1_3_2_1_47_1","unstructured":"Scontain UG. 2021. Python with Encrypted Volume Demo. https:\/\/github.com\/scontain\/volume-demo. Accessed: May 2023."},{"key":"e_1_3_2_1_48_1","unstructured":"Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX fails in practice."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"],"location":"Bologna Italy","acronym":"Middleware '23"},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:52:59Z","timestamp":1756486379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629107"}},"subtitle":["Hardware-assisted Singletons for TEEs"],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":49,"alternative-id":["10.1145\/3590140.3629107","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629107","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}