{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:53Z","timestamp":1772041613709,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":163,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"DFG","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]},{"name":"European Union?s Horizon 2020","award":["Grant Agreement No. 101021808"],"award-info":[{"award-number":["Grant Agreement No. 101021808"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627187","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"744-758","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["No Forking Way: Detecting Cloning Attacks on Intel SGX Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7671-0242","authenticated-orcid":false,"given":"Samira","family":"Briongos","sequence":"first","affiliation":[{"name":"NEC Laboratories Europe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2828-4071","authenticated-orcid":false,"given":"Ghassan","family":"Karame","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum (RUB), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8215-5457","authenticated-orcid":false,"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6092-7866","authenticated-orcid":false,"given":"Annika","family":"Wilde","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum (RUB), Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. SpeicherDPDK. https:\/\/github.com\/mbailleu\/SpeicherDPDK."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Luckychain. https:\/\/github.com\/luckychain\/lucky."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. SafeBricks. https:\/\/github.com\/YangZhou1997\/SafeBricks."},{"key":"e_1_3_2_1_4_1","unstructured":"2016. Town Crier: An Authenticated Data Feed For Smart Contracts. https:\/\/github.com\/bl4ck5un\/Town-Crier."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. TresorSGX. https:\/\/github.com\/ayeks\/TresorSGX."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Ekiden. https:\/\/github.com\/ekiden\/ekiden."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. NeXUS. https:\/\/github.com\/sporgj\/nexus-code."},{"key":"e_1_3_2_1_8_1","unstructured":"2017. ObliDB. https:\/\/github.com\/SabaEskandarian\/ObliDB."},{"key":"e_1_3_2_1_9_1","unstructured":"2017. Obscuro. https:\/\/github.com\/BitObscuro\/Obscuro."},{"key":"e_1_3_2_1_10_1","unstructured":"2017. Opaque. https:\/\/github.com\/mc2-project\/opaque-sql."},{"key":"e_1_3_2_1_11_1","unstructured":"2017. Private Contact Discovery Service (Beta). https:\/\/github.com\/signalapp\/ContactDiscoveryService."},{"key":"e_1_3_2_1_12_1","unstructured":"2017. SGX Enabled OpenStack Barbican Key Management System. https:\/\/github.com\/cloud-security-research\/sgx-kms."},{"key":"e_1_3_2_1_13_1","unstructured":"2017. sgx-papers. https:\/\/github.com\/vschiavoni\/sgx-papers."},{"key":"e_1_3_2_1_14_1","unstructured":"2017. SGX-Tor. https:\/\/github.com\/kaist-ina\/SGX-Tor."},{"key":"e_1_3_2_1_15_1","unstructured":"2017. StealthDB. https:\/\/github.com\/cryptograph\/stealthdb."},{"key":"e_1_3_2_1_16_1","unstructured":"2018. BI-SGX : Bioinformatic Interpreter on SGX-based Secure Computing Cloud. https:\/\/github.com\/hello31337\/BI-SGX."},{"key":"e_1_3_2_1_17_1","unstructured":"2018. Cloud Key Store - secure storage for private credentials. https:\/\/github.com\/cloud-key-store\/keystore."},{"key":"e_1_3_2_1_18_1","unstructured":"2018. LightBox. https:\/\/github.com\/lightbox-impl\/LightBox."},{"key":"e_1_3_2_1_19_1","unstructured":"2018. Oasis Core. https:\/\/github.com\/oasisprotocol\/oasis-core."},{"key":"e_1_3_2_1_20_1","unstructured":"2018. POSUP: Oblivious Search and Update Platform with SGX. https:\/\/github.com\/thanghoang\/POSUP."},{"key":"e_1_3_2_1_21_1","unstructured":"2018. SafeKeeper - Protecting Web passwords using Trusted Execution Environments. https:\/\/github.com\/SafeKeeper\/safekeeper-server."},{"key":"e_1_3_2_1_22_1","unstructured":"2018. ShieldStore. https:\/\/github.com\/cocoppang\/ShieldStore."},{"key":"e_1_3_2_1_23_1","unstructured":"2018. SkSES. https:\/\/github.com\/ndokmai\/sgx-genome-variants-search."},{"key":"e_1_3_2_1_24_1","unstructured":"2019. Awesome SGX Open Source Projects. https:\/\/github.com\/Maxul\/Awesome-SGX-Open-Source."},{"key":"e_1_3_2_1_25_1","unstructured":"2019. Boolean Isolated Searchable Encryption (BISEN). https:\/\/github.com\/bernymac\/BISEN."},{"key":"e_1_3_2_1_26_1","unstructured":"2019. ConsenSGX. https:\/\/github.com\/sshsshy\/ConsenSGX."},{"key":"e_1_3_2_1_27_1","unstructured":"2019. Phala Blockchain. https:\/\/github.com\/Phala-Network\/phala-blockchain."},{"key":"e_1_3_2_1_28_1","unstructured":"2019. The SELIS Publish\/Subscribe system. https:\/\/github.com\/selisproject\/pubsub."},{"key":"e_1_3_2_1_29_1","unstructured":"2020. Plinius. https:\/\/github.com\/anonymous-xh\/plinius."},{"key":"e_1_3_2_1_30_1","unstructured":"2020. QShield. https:\/\/github.com\/fishermano\/QShield."},{"key":"e_1_3_2_1_31_1","unstructured":"2020. Secure XGBoost. https:\/\/github.com\/mc2-project\/secure-xgboost."},{"key":"e_1_3_2_1_32_1","unstructured":"2020. SENG the SGX-Enforcing Network Gateway. https:\/\/github.com\/sengsgx\/sengsgx."},{"key":"e_1_3_2_1_33_1","unstructured":"2020. SGXSSE Maiden. https:\/\/github.com\/MonashCybersecurityLab\/SGXSSE."},{"key":"e_1_3_2_1_34_1","unstructured":"2020. SMac: Secure Genotype Imputation in Intel SGX. https:\/\/github.com\/ndokmai\/sgx-genotype-imputation."},{"key":"e_1_3_2_1_35_1","unstructured":"2020. STANlite. https:\/\/github.com\/ibr-ds\/STANlite."},{"key":"e_1_3_2_1_36_1","unstructured":"2020. X-Search. https:\/\/github.com\/Sand-jrd\/SGX-Search."},{"key":"e_1_3_2_1_37_1","unstructured":"2021. Accelerating Encrypted Deduplication via SGX. https:\/\/github.com\/jingwei87\/sgxdedup."},{"key":"e_1_3_2_1_38_1","unstructured":"2021. Avocado. https:\/\/github.com\/mbailleu\/avocado."},{"key":"e_1_3_2_1_39_1","unstructured":"2021. bwa-sgx-scone. https:\/\/github.com\/dsc-sgx\/bwa-sgx-scone."},{"key":"e_1_3_2_1_40_1","unstructured":"2021. Desearch. https:\/\/github.com\/SJTU-IPADS\/DeSearch."},{"key":"e_1_3_2_1_41_1","volume-title":"Mechanics of MobileCoin","year":"2023","unstructured":"2021. Mechanics of MobileCoin: First Edition. https:\/\/mobilecoin.com\/learn\/read-the-whitepapers\/mechanics\/. Accessed: 23-02-2023."},{"key":"e_1_3_2_1_42_1","unstructured":"2021. Snoopy: A Scalable Oblivious Storage System. https:\/\/github.com\/ucbrise\/snoopy."},{"key":"e_1_3_2_1_43_1","unstructured":"2022. Artifact for paper #1520 SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. https:\/\/github.com\/hku-systems\/SOTER."},{"key":"e_1_3_2_1_44_1","unstructured":"2022. DEBE. https:\/\/github.com\/yzr95924\/DEBE."},{"key":"e_1_3_2_1_45_1","unstructured":"2022. FeIDo Credential Service Intel SGX version. https:\/\/github.com\/feido-token."},{"key":"e_1_3_2_1_46_1","unstructured":"2022. Implementation of the paper \"Differentially-Private Payment Channels with Twilight\". https:\/\/github.com\/saart\/Twilight."},{"key":"e_1_3_2_1_47_1","unstructured":"2022. REX: SGX decentralized recommender. https:\/\/github.com\/rafaelppires\/rex."},{"key":"e_1_3_2_1_48_1","unstructured":"2022. V2V SGX. https:\/\/github.com\/OSUSecLab\/v2v-sgx-prelim."},{"key":"e_1_3_2_1_49_1","unstructured":"2023. CACIC Use Case. https:\/\/github.com\/GTA-UFRJ\/CACIC-Use-Case."},{"key":"e_1_3_2_1_50_1","unstructured":"2023. CloneBuster. https:\/\/github.com\/nec-research\/CloneBuster.git"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358916"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00023"},{"key":"e_1_3_2_1_53_1","volume-title":"USENIX Annual Technical Conference. 65\u201379","author":"Bailleu Maurice","year":"2021","unstructured":"Maurice Bailleu, Dimitra Giantsidi, Vasilis Gavrielatos, Do\u00a0Le Quoc, Vijay Nagarajan, and Pramod Bhatotia. 2021. Avocado: A Secure In-Memory Distributed Storage System.. In USENIX Annual Technical Conference. 65\u201379."},{"key":"e_1_3_2_1_54_1","volume-title":"SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution.. In FAST. 173\u2013190.","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu, J\u00f6rg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution.. In FAST. 173\u2013190."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064213"},{"key":"e_1_3_2_1_56_1","volume-title":"Private data objects: an overview. arXiv preprint arXiv:1807.05686","author":"Bowman Mic","year":"2018","unstructured":"Mic Bowman, Andrea Miele, Michael Steiner, and Bruno Vavala. 2018. Private data objects: an overview. arXiv preprint arXiv:1807.05686 (2018)."},{"key":"e_1_3_2_1_57_1","volume-title":"Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric. arXiv preprint arXiv:1805.08541","author":"Brandenburger Marcus","year":"2018","unstructured":"Marcus Brandenburger, Christian Cachin, R\u00fcdiger Kapitza, and Alessandro Sorniotti. 2018. Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric. arXiv preprint arXiv:1805.08541 (2018)."},{"key":"e_1_3_2_1_58_1","volume-title":"47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 157\u2013168.","author":"Brandenburger Marcus","unstructured":"Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and R\u00fcdiger Kapitza. 2017. Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. In 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 157\u2013168."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Samira Briongos Ghassan Karame Claudio Soriente and Annika Wilde. 2023. No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. arxiv:2310.03002\u00a0[cs.CR]","DOI":"10.1145\/3627106.3627187"},{"key":"e_1_3_2_1_60_1","volume-title":"Intel SGX enabled key manager service with openstack barbican. arXiv preprint arXiv:1712.07694","author":"Chakrabarti Somnath","year":"2017","unstructured":"Somnath Chakrabarti, Brandon Baker, and Mona Vij. 2017. Intel SGX enabled key manager service with openstack barbican. arXiv preprint arXiv:1712.07694 (2017)."},{"key":"e_1_3_2_1_61_1","volume-title":"Strongly Secure and Efficient Data Shuffle on Hardware Enclaves. In 2nd Workshop on System Software for Trusted Execution (SysTEX). 1:1\u20131:6.","author":"Chen Ju","year":"2017","unstructured":"Ju Chen, Yuzhe\u00a0Richard Tang, and Hao Zhou. 2017. Strongly Secure and Efficient Data Shuffle on Hardware Enclaves. In 2nd Workshop on System Software for Trusted Execution (SysTEX). 1:1\u20131:6."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361533"},{"key":"e_1_3_2_1_63_1","volume-title":"Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. In Asia Conference on Computer and Communications Security (AsiaCCS). 601\u2013608","author":"Chen Sanchuan","year":"2018","unstructured":"Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby\u00a0B. Lee, Haibo Chen, and XiaoFeng Wang. 2018. Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. In Asia Conference on Computer and Communications Security (AsiaCCS). 601\u2013608."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3024880"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361546"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00050"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00049"},{"key":"e_1_3_2_1_71_1","volume-title":"Privacy-preserving genotype imputation in a trusted execution environment. Cell systems 12, 10","author":"Dokmai Natnatee","year":"2021","unstructured":"Natnatee Dokmai, Can Kockan, Kaiyuan Zhu, XiaoFeng Wang, S\u00a0Cenk Sahinalp, and Hyunghoon Cho. 2021. Privacy-preserving genotype imputation in a trusted execution environment. Cell systems 12, 10 (2021), 983\u2013993."},{"key":"e_1_3_2_1_72_1","volume-title":"Twilight: A Differentially Private Payment Channel Network. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Dotan Maya","year":"2022","unstructured":"Maya Dotan, Saar Tochner, Aviv Zohar, and Yossi Gilad. 2022. Twilight: A Differentially Private Payment Channel Network. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 555\u2013570. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/dotan"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339814"},{"key":"e_1_3_2_1_74_1","volume-title":"Theory and Applications of Satisfiability Testing","author":"E\u00e9n Niklas","unstructured":"Niklas E\u00e9n and Niklas S\u00f6rensson. 2004. An Extensible SAT-solver. In Theory and Applications of Satisfiability Testing. Springer Berlin Heidelberg, Berlin, Heidelberg, 502\u2013518."},{"key":"e_1_3_2_1_75_1","volume-title":"Oblidb: Oblivious query processing for secure databases. arXiv preprint arXiv:1710.00458","author":"Eskandarian Saba","year":"2017","unstructured":"Saba Eskandarian and Matei Zaharia. 2017. Oblidb: Oblivious query processing for secure databases. arXiv preprint arXiv:1710.00458 (2017)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3012100"},{"key":"e_1_3_2_1_77_1","unstructured":"MobileCoin Foundation. 2019. MobileCoin. https:\/\/github.com\/mobilecoinfoundation\/mobilecoin."},{"key":"e_1_3_2_1_78_1","volume-title":"HardIDX: Practical and Secure Index with SGX","author":"Fuhry Benny","unstructured":"Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, and Ahmad-Reza Sadeghi. 2017. HardIDX: Practical and Secure Index with SGX. In Data and Applications Security and Privacy XXXI. Springer International Publishing, Cham, 386\u2013408."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00061"},{"key":"e_1_3_2_1_80_1","unstructured":"giganetom\u00a0et al.2018. SATisPy. https:\/\/github.com\/netom\/satispy. Accessed: 2020-10-01."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00048"},{"key":"e_1_3_2_1_82_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 217\u2013233. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/gruss"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2015.70"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0010"},{"key":"e_1_3_2_1_85_1","unstructured":"Hyperledger. 2018. Hyperledger Fabric Private Chaincode. https:\/\/github.com\/hyperledger\/fabric-private-chaincode."},{"key":"e_1_3_2_1_86_1","unstructured":"Intel(R). 2021. Intel\u00ae Xeon\u00ae Scalable Processors. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/processors\/xeon\/scalable.html."},{"key":"e_1_3_2_1_87_1","volume-title":"Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. In 2015 Euromicro Conference on Digital System Design. 629\u2013636","author":"Irazoqui G.","unstructured":"G. Irazoqui, T. Eisenbarth, and B. Sunar. 2015. Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. In 2015 Euromicro Conference on Digital System Design. 629\u2013636."},{"key":"e_1_3_2_1_88_1","volume-title":"SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Islam Saad","year":"2019","unstructured":"Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar. 2019. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 621\u2013637. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/islam"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23044"},{"key":"e_1_3_2_1_90_1","volume-title":"Towards Formal Verification of State Continuity for Enclave Programs. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Jangid Mohit\u00a0Kumar","year":"2021","unstructured":"Mohit\u00a0Kumar Jangid, Guoxing Chen, Yinqian Zhang, and Zhiqiang Lin. 2021. Towards Formal Verification of State Continuity for Enclave Programs. In 30th USENIX Security Symposium (USENIX Security 21). 573\u2013590."},{"key":"e_1_3_2_1_91_1","unstructured":"Prasad\u00a0Koshy Jose. 2020. Confidential Computing of Machine Learning using Intel SGX. https:\/\/github.com\/prasadkjose\/confidential-ml-sgx."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23060"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2868054"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303951"},{"key":"e_1_3_2_1_95_1","volume-title":"Secure Network Interface with SGX. https:\/\/github.com\/fkirc\/secure-network-interface-with-sgx. GitHub repository","author":"Kirchengast Felix","year":"2019","unstructured":"Felix Kirchengast. 2019. Secure Network Interface with SGX. https:\/\/github.com\/fkirc\/secure-network-interface-with-sgx. GitHub repository (2019)."},{"key":"e_1_3_2_1_96_1","volume-title":"Sketching algorithms for genomic data analysis and querying in a secure enclave. Nature methods 17, 3","author":"Kockan Can","year":"2020","unstructured":"Can Kockan, Kaiyuan Zhu, Natnatee Dokmai, Nikolai Karpov, M\u00a0Oguzhan Kulekci, David\u00a0P Woodruff, and S\u00a0Cenk Sahinalp. 2020. Sketching algorithms for genomic data analysis and querying in a secure enclave. Nature methods 17, 3 (2020), 295\u2013301."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186101"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3234518"},{"key":"e_1_3_2_1_100_1","unstructured":"Hyperledger Labs. 2018. Hyperledger Private Data Objects. https:\/\/github.com\/hyperledger-labs\/private-data-objects."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568002"},{"key":"e_1_3_2_1_102_1","unstructured":"Michael Larabel and Matthew Tippett. 2008. Phoronix Test Suite. http:\/\/www.phoronix-test-suite.com\/."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419420"},{"key":"e_1_3_2_1_104_1","unstructured":"Mingyu Li Jinhao Zhu Tianxu Zhang Cheng Tan Yubin Xia Sebastian Angel and Haibo Chen. 2021. Bringing Decentralized Search to Decentralized Services.. In OSDI. 331\u2013347."},{"key":"e_1_3_2_1_105_1","volume-title":"Teechain: A Secure Payment Network with Asynchronous Blockchain Access. https:\/\/github.com\/lsds\/Teechain.","author":"Lind Joshua","year":"2018","unstructured":"Joshua Lind. 2018. Teechain: A Secure Payment Network with Asynchronous Blockchain Access. https:\/\/github.com\/lsds\/Teechain."},{"key":"e_1_3_2_1_106_1","volume-title":"Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter Pietzuch, and Emin\u00a0G\u00fcn Sirer. 2017. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454 (2017)."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_2_1_108_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 549\u2013564. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/lipp"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_110_1","unstructured":"Rudolf Loretan. 2021. Enclave hardening for private ML. https:\/\/github.com\/loretanr\/dp-gbdt."},{"key":"e_1_3_2_1_111_1","unstructured":"Moxie Marlinspike. 2017. Technology preview: Private contact discovery for Signal. https:\/\/signal.org\/blog\/private-contact-discovery\/. (2017). Accessed: 09-03-2023."},{"key":"e_1_3_2_1_112_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) (SEC\u201917). USENIX Association, USA, 1289\u20131306."},{"key":"e_1_3_2_1_113_1","volume-title":"USENIX Security Symposium. 1387\u20131403","author":"Matetic Sinisa","year":"2018","unstructured":"Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, and Srdjan Capkun. 2018. DelegaTEE: Brokered Delegation Using Trusted Execution Environments.. In USENIX Security Symposium. 1387\u20131403."},{"key":"e_1_3_2_1_114_1","volume-title":"USENIX Security Symposium. 783\u2013800","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.. In USENIX Security Symposium. 783\u2013800."},{"key":"e_1_3_2_1_115_1","volume-title":"RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. 48\u201365","author":"Maurice Cl\u00e9mentine","year":"2015","unstructured":"Cl\u00e9mentine Maurice, Nicolas\u00a0Le Scouarnec, Christoph Neumann, Olivier Heen, and Aur\u00e9lien Francillon. 2015. Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. In Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. 48\u201365."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Ittai Anati Dror Caspi Simon Johnson Rebekah Leslie-Hurd and Carlos\u00a0V. Rozas. 2016. Intel Software Guard Extensions (Intel\u00ae SGX) Support for Dynamic Memory Management Inside an Enclave. In HASP@ISCA. 10:1\u201310:9.","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135987"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560620"},{"key":"e_1_3_2_1_120_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 227\u2013240. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oleksenko"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00053"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988346"},{"key":"e_1_3_2_1_125_1","volume-title":"Safebricks: Shielding network functions in the cloud. In 15th { USENIX} Symposium on Networked Systems Design and Implementation ({ NSDI} 18). 201\u2013216.","author":"Poddar Rishabh","year":"2018","unstructured":"Rishabh Poddar, Chang Lan, Raluca\u00a0Ada Popa, and Sylvia Ratnasamy. 2018. Safebricks: Shielding network functions in the cloud. In 15th { USENIX} Symposium on Networked Systems Design and Implementation ({ NSDI} 18). 201\u2013216."},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3024853"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425687"},{"key":"e_1_3_2_1_129_1","volume-title":"SGXDedup. In USENIX Annual Technical Conference. 957\u2013971","author":"Ren Yanjing","year":"2021","unstructured":"Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick\u00a0PC Lee, and Xiaosong Zhang. 2021. SGXDedup. In USENIX Annual Technical Conference. 957\u2013971."},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007796"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00043"},{"key":"e_1_3_2_1_132_1","unstructured":"Aoi Sakurai. 2019. BI-SGX: Secure Cloud Computation. https:\/\/github.com\/hello31337\/BI-SGX. Accessed: 2023-01-16."},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00024"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0050"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/hpcs48598.2019.9188239"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560584"},{"key":"e_1_3_2_1_137_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 753\u2013770","author":"Schwarz Fabian","year":"2020","unstructured":"Fabian Schwarz and Christian Rossow. 2020. SENG, the sgx-enforcing network gateway: Authorizing communication from shielded clients. In Proceedings of the 29th USENIX Conference on Security Symposium. 753\u2013770."},{"key":"e_1_3_2_1_138_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Schwarz Michael","unstructured":"Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, Cham, 3\u201324."},{"key":"e_1_3_2_1_139_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Shen Tianxiang","year":"2022","unstructured":"Tianxiang Shen, Ji Qi, Jianyu Jiang, Xian Wang, Siyuan Wen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Xiapu Luo, Fengwei Zhang, and Heming Cui. 2022. SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). USENIX Association, Carlsbad, CA, 723\u2013738. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/shen"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. https:\/\/doi.org\/10.14722\/ndss.2017.23193","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2011.6008552"},{"key":"e_1_3_2_1_143_1","volume-title":"25th USENIX Security Symposium. 875\u2013892","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens. 2016. Ariadne: A Minimal Approach to State Continuity. In 25th USENIX Security Symposium. 875\u2013892."},{"key":"e_1_3_2_1_144_1","volume-title":"The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs\/1712.08519","author":"Strackx Raoul","year":"2017","unstructured":"Raoul Strackx and Frank Piessens. 2017. The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs\/1712.08519 (2017)."},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447705"},{"key":"e_1_3_2_1_146_1","doi-asserted-by":"crossref","unstructured":"Guilherme\u00a0A. Thomaz Matheus\u00a0B. Guerra Matteo Sammarco Marcin Detyniecki and Miguel Elias\u00a0M. Campista. 2022. Tamper-proof Access Control for IoT Clouds Using Enclaves. (2022). https:\/\/www.gta.ufrj.br\/ftp\/gta\/TechReports\/TGS23.pdf","DOI":"10.1016\/j.adhoc.2023.103191"},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421273"},{"key":"e_1_3_2_1_148_1","volume-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287","author":"Tramer Florian","year":"2018","unstructured":"Florian Tramer and Dan Boneh. 2018. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287 (2018)."},{"key":"e_1_3_2_1_149_1","unstructured":"Florian Tram\u00e8r and Dan Boneh. 2018. SLALOM. https:\/\/github.com\/ftramer\/slalom."},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274750"},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314364"},{"key":"e_1_3_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0052"},{"key":"e_1_3_2_1_154_1","volume-title":"Applied Cryptography and Network Security","author":"Vo Viet","unstructured":"Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, and Joseph\u00a0K. Liu. 2021. Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. In Applied Cryptography and Network Security. Springer International Publishing, Cham, 50\u201375."},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00098"},{"key":"e_1_3_2_1_156_1","unstructured":"wolfSSL. 2017. wolfSSL Linux Enclave Example. https:\/\/github.com\/wolfSSL\/wolfssl-examples\/tree\/master\/SGX_Linux. Accessed: 2020-21-04."},{"key":"e_1_3_2_1_157_1","volume-title":"Aria: Tolerating Skewed Workloads in Secure In-memory Key-value Stores. In 37th IEEE International Conference on Data Engineering (ICDE). 1020\u20131031","author":"Yang Fan","year":"2021","unstructured":"Fan Yang, Youmin Chen, Youyou Lu, Qing Wang, and Jiwu Shu. 2021. Aria: Tolerating Skewed Workloads in Secure In-memory Key-value Stores. In 37th IEEE International Conference on Data Engineering (ICDE). 1020\u20131031."},{"key":"e_1_3_2_1_158_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Yang Zuoru","unstructured":"Zuoru Yang, Jingwei Li, and Patrick P.\u00a0C. Lee. 2022. Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). USENIX Association, Carlsbad, CA, 37\u201352. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/yang-zuoru"},{"key":"e_1_3_2_1_159_1","first-page":"905","article-title":"Mapping the Intel Last-Level Cache","volume":"2015","author":"Yarom Yuval","year":"2015","unstructured":"Yuval Yarom, Qian Ge, Fangfei Liu, Ruby\u00a0B. Lee, and Gernot Heiser. 2015. Mapping the Intel Last-Level Cache. IACR Cryptology ePrint Archive 2015 (2015), 905. https:\/\/eprint.iacr.org\/2015\/905","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_160_1","unstructured":"Hang Yin Shunfan Zhou and Jun Jiang. 2019. Phala network: A confidential smart contract network based on polkadot."},{"key":"e_1_3_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00022"},{"key":"e_1_3_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_163_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform.. In NSDI, Vol.\u00a017. 283\u2013298.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro\u00a0G Beekman, Raluca\u00a0Ada Popa, Joseph\u00a0E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform.. In NSDI, Vol.\u00a017. 283\u2013298."}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC '23"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:40:18Z","timestamp":1755884418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":163,"alternative-id":["10.1145\/3627106.3627187","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627187","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}