{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:44:28Z","timestamp":1772041468557,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swiss National Science Foundation","award":["200021_178822"],"award-info":[{"award-number":["200021_178822"]}]},{"DOI":"10.13039\/501100006374","name":"Oracle","doi-asserted-by":"publisher","award":["3801"],"award-info":[{"award-number":["3801"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629116","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"207-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SecV"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3371-9228","authenticated-orcid":false,"given":"Peterson","family":"Yuhala","sequence":"first","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1574-6721","authenticated-orcid":false,"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2228-7327","authenticated-orcid":false,"given":"Hugo","family":"Guiroux","sequence":"additional","affiliation":[{"name":"Oracle Labs, Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2876-8292","authenticated-orcid":false,"given":"Jean-Pierre","family":"Lozi","sequence":"additional","affiliation":[{"name":"Inria, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7789-8400","authenticated-orcid":false,"given":"Alain","family":"Tchana","sequence":"additional","affiliation":[{"name":"Grenoble INP, Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9444-1071","authenticated-orcid":false,"given":"Ga\u00ebl","family":"Thomas","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/go.googlesource.com\/gollvm\/","author":"LLVM.","year":"2023","unstructured":"GoLLVM. https:\/\/go.googlesource.com\/gollvm\/, 2023. Accessed: Sept. 19, 2023."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22496-7_9"},{"key":"e_1_3_2_1_4_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. SCONE: Secure Linux containers with intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), Savannah, GA, USA, 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2784768"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281074.3284935"},{"key":"e_1_3_2_1_7_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2004 SIAM International Conference on Data Mining (SDM 04)","author":"Chakrabarti Deepayan","year":"2004","unstructured":"Deepayan Chakrabarti, Yiping Zhan, and Christos Faloutsos. R-MAT: A recursive model for graph mining. In Proceedings of the 2004 SIAM International Conference on Data Mining (SDM 04), Lake Buena Vista, FL, USA, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354220"},{"key":"e_1_3_2_1_10_1","volume-title":"Intel tdx demystified: A top-down approach. arXiv preprint arXiv:2303.15540","author":"Cheng Pau-Chen","year":"2023","unstructured":"Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, and James Bottomley. Intel tdx demystified: A top-down approach. arXiv preprint arXiv:2303.15540, 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_12_1","volume-title":"Accessed","author":"Intel Corporation","year":"2022","unstructured":"Intel Corporation. Intel SGX Developer Ref. for Linux. https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.15\/docs\/Intel_SGX_Developer_Reference_Linux_2.15_Open_Source.pdf. Accessed: Oct 23, 2022."},{"key":"e_1_3_2_1_13_1","volume-title":"Intel SGX explained. IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. Intel SGX explained. IACR Cryptology ePrint Archive, 2016(86):1--186, 2016."},{"key":"e_1_3_2_1_14_1","first-page":"571","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Ghosn Adrien","year":"2019","unstructured":"Adrien Ghosn, James R Larus, and Edouard Bugnion. Secured routines: Language-based construction of trusted execution environments. In 2019 USENIX Annual Technical Conference (USENIX ATC 19), pages 571--586, 2019."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2936313.2816714"},{"key":"e_1_3_2_1_16_1","volume-title":"26th USENIX Security Symposium, (USENIX Security 2017","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, Istv\u00e1n Haller, and Manuel Costa. Strong and efficient cache side-channel protection using hardware transactional memory. In 26th USENIX Security Symposium, (USENIX Security 2017), Vancouver, BC, Canada, 2017."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel. Reference Architecture for Privacy Preserving Machine Learning with Intel\u00ae SGX and TensorFlow Serving. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/privacy-preserving-ml-with-sgx-and-tensorflow.html 2022. Accessed: Oct 28 2022."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020","author":"Jiang Jianyu","year":"2020","unstructured":"Jianyu Jiang, Xusheng Chen, TszOn Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, and Fengwei Zhang. Uranus: Simple, efficient SGX programming and its applications. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020), Taipei, Taiwan, 2020."},{"key":"e_1_3_2_1_19_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan, Jeremy Powell, and Tom Woller. AMD memory encryption. White paper, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519582"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426182.3426184"},{"key":"e_1_3_2_1_22_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Kyrola Aapo","year":"2012","unstructured":"Aapo Kyrola, Guy Blelloch, and Carlos Guestrin. Graphchi: Large-scale graph computation on just a PC. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), Boston, MA, USA, 2012."},{"key":"e_1_3_2_1_23_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Christof Fetzer, and Peter Pietzuch. Glamdring: Automatic application partitioning for Intel SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, USA, 2017."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00025"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_26_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 2018","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. Varys: Protecting SGX enclaves from practical side-channel attacks. In 2018 USENIX Annual Technical Conference (USENIX ATC 2018), Boston, MA, USA, 2018."},{"key":"e_1_3_2_1_27_1","unstructured":"Oracle. GraalVM Profiling Command Line Tools. https:\/\/www.graalvm.org\/22.2\/tools\/profiling\/."},{"key":"e_1_3_2_1_28_1","volume-title":"Accessed","year":"2021","unstructured":"Oracle. GraalVM SDK Java API Reference -- CEntryPoint. https:\/\/www.graalvm.org\/sdk\/javadoc\/org\/graalvm\/nativeimage\/c\/function\/CEntryPoint.html, 2021. Accessed: April 29, 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"Accessed","year":"2022","unstructured":"Oracle. Execution Event Node. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/instrumentation\/ExecutionEventNode.html, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/github.com\/oracle\/fastr","author":"Fast","year":"2022","unstructured":"Oracle. Fast R. https:\/\/github.com\/oracle\/fastr, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_31_1","volume-title":"https:\/\/github.com\/oracle\/graalpython","author":"Python Graal","year":"2022","unstructured":"Oracle. Graal Python. https:\/\/github.com\/oracle\/graalpython, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_32_1","volume-title":"https:\/\/github.com\/oracle\/graaljs","author":"JS.","year":"2022","unstructured":"Oracle. GraalJS. https:\/\/github.com\/oracle\/graaljs, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_33_1","volume-title":"Accessed","year":"2022","unstructured":"Oracle. GraalVM Chrome Debugger. https:\/\/www.graalvm.org\/22.2\/tools\/chrome-debugger\/, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/frame\/Frame.html","author":"Frame Interface","year":"2022","unstructured":"Oracle. Interface Frame. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/frame\/Frame.html, 2022. Accessed: Oct 15, 2022."},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/github.com\/oracle\/graaljs\/blob\/master\/graaljs\/src\/com.oracle.truffle.js\/src\/com\/oracle\/truffle\/js\/nodes\/function\/JSFunctionCallNode.java","year":"2022","unstructured":"Oracle. JSFunctionCallNode. https:\/\/github.com\/oracle\/graaljs\/blob\/master\/graaljs\/src\/com.oracle.truffle.js\/src\/com\/oracle\/truffle\/js\/nodes\/function\/JSFunctionCallNode.java, 2022. Accessed: Oct 15, 2022."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/github.com\/oracle\/graaljs\/blob\/master\/graal-js\/src\/com.oracle.truffle.js\/src\/com\/oracle\/truffle\/js\/nodes\/instrumentation\/JSTags.java","year":"2022","unstructured":"Oracle. JSTags. https:\/\/github.com\/oracle\/graaljs\/blob\/master\/graal-js\/src\/com.oracle.truffle.js\/src\/com\/oracle\/truffle\/js\/nodes\/instrumentation\/JSTags.java, 2022. Accessed: Oct 15, 2022."},{"key":"e_1_3_2_1_37_1","volume-title":"https:\/\/github.com\/oracle\/graalpython\/blob\/master\/graalpython\/com.oracle.graal.python\/src\/com\/oracle\/graal\/python\/nodes\/instrumentation\/NodeObjectDescriptor.java","year":"2022","unstructured":"Oracle. NodeObjectDescriptor. https:\/\/github.com\/oracle\/graalpython\/blob\/master\/graalpython\/com.oracle.graal.python\/src\/com\/oracle\/graal\/python\/nodes\/instrumentation\/NodeObjectDescriptor.java, 2022. Accessed: Oct 15, 2022."},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/docs.oracle.com\/javase\/tutorial\/essential\/io\/objectstreams.html","author":"Streams Object","year":"2022","unstructured":"Oracle. Object Streams. https:\/\/docs.oracle.com\/javase\/tutorial\/essential\/io\/objectstreams.html, 2022. Accessed: Oct 20, 2022."},{"key":"e_1_3_2_1_39_1","volume-title":"Polyglot Programming. https:\/\/www.graalvm.org\/22.0\/reference-manual\/polyglot-programming\/","year":"2022","unstructured":"Oracle. Polyglot Programming. https:\/\/www.graalvm.org\/22.0\/reference-manual\/polyglot-programming\/, 2022. Accessed: Feb 18, 2022."},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/github.com\/oracle\/graalpython\/blob\/master\/graalpython\/com.oracle.graal.python\/src\/com\/oracle\/graal\/python\/nodes\/call\/PythonCallNode.java","year":"2022","unstructured":"Oracle. PythonCallNode. https:\/\/github.com\/oracle\/graalpython\/blob\/master\/graalpython\/com.oracle.graal.python\/src\/com\/oracle\/graal\/python\/nodes\/call\/PythonCallNode.java, 2022. Accessed: March 1, 2022."},{"key":"e_1_3_2_1_41_1","volume-title":"Standard Tags. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/instrumentation\/StandardTags.html","year":"2022","unstructured":"Oracle. Standard Tags. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/instrumentation\/StandardTags.html, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/github.com\/oracle\/graal\/tree\/master\/sulong","year":"2022","unstructured":"Oracle. Sulong. https:\/\/github.com\/oracle\/graal\/tree\/master\/sulong, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_43_1","volume-title":"Accessed","year":"2022","unstructured":"Oracle. Truffle Language Implementation Framework. https:\/\/www.graalvm.org\/22.0\/graalvm-as-a-platform\/language-implementation-framework\/, 2022. Accessed: Feb 18, 2022."},{"key":"e_1_3_2_1_44_1","volume-title":"Truffle Language Implementation Framework. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/instrumentation\/InstrumentableNode.WrapperNode.html","year":"2022","unstructured":"Oracle. Truffle Language Implementation Framework. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/instrumentation\/InstrumentableNode.WrapperNode.html, 2022. Accessed: Oct 3, 2022."},{"key":"e_1_3_2_1_45_1","volume-title":"https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/nodes\/Node.html","author":"Node Truffle","year":"2022","unstructured":"Oracle. Truffle Node. https:\/\/www.graalvm.org\/truffle\/javadoc\/com\/oracle\/truffle\/api\/nodes\/Node.html, 2022. Accessed: Oct 15, 2022."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/github.com\/oracle\/truffleruby","author":"Ruby Truffle","year":"2022","unstructured":"Oracle. Truffle Ruby. https:\/\/github.com\/oracle\/truffleruby, 2022. Accessed: Oct 11, 2022."},{"key":"e_1_3_2_1_47_1","volume-title":"https:\/\/www.graalvm.org\/22.2\/reference-manual\/java\/compiler\/","author":"Compiler Graal","year":"2023","unstructured":"Oracle. Graal Compiler. https:\/\/www.graalvm.org\/22.2\/reference-manual\/java\/compiler\/, 2023."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_49_1","volume-title":"SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143, 2019."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425687"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_53_1","first-page":"955","article-title":"Secure and efficient multitasking inside a single enclave of intel SGX. In James R. Larus, Luis Ceze, and Karin Strauss, editors, ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, Lausanne","volume":"16","author":"Shen Youren","year":"2020","unstructured":"Youren Shen, Hongliang Tian, Yu Chen, Kang Chen, Runji Wang, Yi Xu, Yubin Xia, and Shoumeng Yan. Occlum: Secure and efficient multitasking inside a single enclave of intel SGX. In James R. Larus, Luis Ceze, and Karin Strauss, editors, ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, March 16-20, 2020, pages 955--970. ACM, 2020.","journal-title":"Switzerland, March"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380390"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"e_1_3_2_1_56_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 2017","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E. Porter, and Mona Vij. Graphene-SGX: A practical library OS for unmodified applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 2017), Santa Clara, CA, USA, 2017."},{"key":"e_1_3_2_1_57_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Tsai Chia-Che","year":"2020","unstructured":"Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, and Donald E. Porter. Civet: An efficient Java partitioning framework for hardware enclaves. In 29th USENIX Security Symposium (USENIX Security 20), Online, 2020."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.22152\/programming-journal.org\/2018\/2\/14"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360610"},{"key":"e_1_3_2_1_61_1","first-page":"187","volume-title":"One vm to rule them all. Onward!","author":"W\u00fcrthinger Thomas","year":"2013","unstructured":"Thomas W\u00fcrthinger, Christian Wimmer, Andreas W\u00f6\u00df, Lukas Stadler, Gilles Duboscq, Christian Humer, Gregor Richards, Doug Simon, and Mario Wolczko. One vm to rule them all. Onward! 2013, page 187--204, New York, NY, USA, 2013. Association for Computing Machinery."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480360.2384587"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"key":"e_1_3_2_1_64_1","volume-title":"Toward practical privacy-preserving linear regression. Inf. Sci., 596(C):119--136, jun","author":"Xu Wenju","year":"2022","unstructured":"Wenju Xu, Baocang Wang, Jiasen Liu, Yange Chen, Pu Duan, and Zhiyong Hong. Toward practical privacy-preserving linear regression. Inf. Sci., 596(C):119--136, jun 2022."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00022"},{"key":"e_1_3_2_1_66_1","first-page":"352","volume-title":"Jean-Pierre Lozi. Montsalvat: Intel SGX Shielding for GraalVM Native Images. In Proceedings of the 22nd International Middleware Conference, Middleware '21","author":"Yuhala Peterson","year":"2021","unstructured":"Peterson Yuhala, J\u00e4mes M\u00e9n\u00e9trey, Pascal Felber, Valerio Schiavoni, Alain Tchana, Ga\u00ebl Thomas, Hugo Guiroux, and Jean-Pierre Lozi. Montsalvat: Intel SGX Shielding for GraalVM Native Images. In Proceedings of the 22nd International Middleware Conference, Middleware '21, page 352--364, New York, NY, USA, 2021. Association for Computing Machinery."}],"event":{"name":"Middleware '23: 24th International Middleware Conference","location":"Bologna Italy","acronym":"Middleware '23","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:53:26Z","timestamp":1756486406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629116"}},"subtitle":["Secure Code Partitioning via Multi-Language Secure Values"],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":66,"alternative-id":["10.1145\/3590140.3629116","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629116","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}