{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:22Z","timestamp":1750309222809,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372218"],"award-info":[{"award-number":["62372218"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["SGDX20201103095408029"],"award-info":[{"award-number":["SGDX20201103095408029"]}]},{"DOI":"10.13039\/100018919","name":"Peng Cheng Laboratory","doi-asserted-by":"publisher","award":["PCL2022A03-01"],"award-info":[{"award-number":["PCL2022A03-01"]}],"id":[{"id":"10.13039\/100018919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3657025","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1554-1567","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ESem: To Harden Process Synchronization for Servers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3311-7435","authenticated-orcid":false,"given":"Zhanbo","family":"Wang","sequence":"first","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, China"},{"name":"Peng Cheng Laboratory, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9247-2431","authenticated-orcid":false,"given":"Jiaxin","family":"Zhan","sequence":"additional","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, China"},{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3974-590X","authenticated-orcid":false,"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"},{"name":"Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8355-0969","authenticated-orcid":false,"given":"Ning","family":"Hu","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Open Enclave SDK. https:\/\/openenclave.io\/sdk\/. Build Trusted Execution Environment based application."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Ahmad Adil","year":"2021","unstructured":"Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, and Byoungyoung Lee. 2021. CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE International Conference on Services Computing. IEEE, 108--115","author":"Ahmed Ishtiaq","year":"2020","unstructured":"Ishtiaq Ahmed, Saeid Mofrad, Shiyong Lu, Changxin Bai, Fengwei Zhang, and Dunren Che. 2020. SEED: Confidential big data workflow scheduling with Intel SGX under deadline constraints. In Proceedings of the IEEE International Conference on Services Computing. IEEE, 108--115."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the IEEE International Conference on Cluster Computing. IEEE, 1--7.","author":"Akkan Hakan","year":"2013","unstructured":"Hakan Akkan, Michael Lang, and Latchesar Ionkov. 2013. HPC runtime support for fast and power efficient locking and synchronization. In Proceedings of the IEEE International Conference on Cluster Computing. IEEE, 1--7."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 25th European Conference on Computer Systems. 298--313","author":"Ul Alam Mohammad Mejbah","year":"2017","unstructured":"Mohammad Mejbah Ul Alam, Tongping Liu, Guangming Zeng, and Abdullah Muzahid. 2017. Syncperf: Categorizing, detecting, and diagnosing synchronization performance bugs. In Proceedings of the 25th European Conference on Computer Systems. 298--313."},{"key":"e_1_3_2_1_7_1","unstructured":"AMD. 2023. AMD Secure Encrypted Virtualization. https:\/\/www.amd.com\/en\/developer\/sev.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Apache Software Foundation. 2023. Apache HTTP Server. https:\/\/httpd.apache.org\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Apache Software Foundation. 2023. Apache TEACLAVE. https:\/\/teaclave.apache.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"ARM. 2021. Arm CCA Security Model 1.0. https:\/\/developer.arm.com\/documentation\/DEN0096\/latest."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 689--703","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'keeffe, Mark L Stillwell, et al. 2016. SCONE: Secure Linux containers with Intel SGX. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 689--703."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 335--348","author":"Belay Adam","year":"2012","unstructured":"Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe user-level access to privileged CPU features. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 335--348."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the IEEE International Conference on Cloud Computing Technology and Science. IEEE, 67--72","author":"Burihabwa Dorian","year":"2018","unstructured":"Dorian Burihabwa, Pascal Felber, Hugues Mercier, and Valerio Schiavoni. 2018. SGX-FS: hardening a file system in user-space with Intel SGX. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science. IEEE, 67--72."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the USENIX Security Symposium. 4095--4110","author":"Chen Guoxing","year":"2022","unstructured":"Guoxing Chen and Yinqian Zhang. 2022. MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. In Proceedings of the USENIX Security Symposium. 4095--4110."},{"key":"e_1_3_2_1_16_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064203"},{"key":"e_1_3_2_1_18_1","unstructured":"Free Software Foundation. 2023. GNU C Library. https:\/\/www.gnu.org\/software\/libc\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 31st USENIX Security Symposium. 3129--3145","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. A Hardware-Software Co-design for Efficient Intra-Enclave Isolation. In Proceedings of the 31st USENIX Security Symposium. 3129--3145."},{"key":"e_1_3_2_1_20_1","unstructured":"Intel. 2023. 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-sdm.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Intel. 2023. Intel Trust Domain Extensions (Intel TDX). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/documentation.html."},{"key":"e_1_3_2_1_22_1","unstructured":"Intel Corporation. 2023. Intel Software Guard Extensions (SGX) for Linux. https:\/\/github.com\/intel\/linux-sgx."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the CyberLink Community Forum. https:\/\/forum.cyberlink.com\/forum\/posts\/list\/83604","author":"AndersonJr","year":"2020","unstructured":"JamesAndersonJr et al. 2020. NEWS: Intel plans to drop SGX support from its 11th Gen Desktop Processors in favor of TME\/MKTME. Proceedings of the CyberLink Community Forum. https:\/\/forum.cyberlink.com\/forum\/posts\/list\/83604.page"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the ACM on Asia Conference on Computer and Communications Security. 19--30","author":"Karande Vishal","year":"2017","unstructured":"Vishal Karande, Erick Bauman, Zhiqiang Lin, and Latifur Khan. 2017. SGX-Log: Securing system logs with SGX. In Proceedings of the ACM on Asia Conference on Computer and Communications Security. 19--30."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. 285--298","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, et al. 2017. Glamdring: Automatic application partitioning for Intel SGX. In Proceedings of the USENIX Annual Technical Conference. 285--298."},{"key":"e_1_3_2_1_26_1","unstructured":"LMBench. 2023. LMBench. https:\/\/lmbench.sourceforge.net\/. A System Performance Measurement Tool."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24065"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the USENIX Security Symposium. 3897--3916","author":"Patel Yuvraj","year":"2022","unstructured":"Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C Arpaci-Dusseau, Remzi H Arpaci-Dusseau, and Michael M Swift. 2022. Using Tratr to tame Adversarial Synchronization. In Proceedings of the USENIX Security Symposium. 3897--3916."},{"key":"e_1_3_2_1_29_1","unstructured":"PostgreSQL. 2023. PostgreSQL. https:\/\/www.postgresql.org\/. An open source database."},{"key":"e_1_3_2_1_30_1","volume-title":"SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143 (2019)."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 264--278","author":"Priebe Christian","year":"2018","unstructured":"Christian Priebe, Kapil Vaswani, and Manuel Costa. 2018. EnclaveDB: A secure database using SGX. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 264--278."},{"key":"e_1_3_2_1_32_1","unstructured":"Redis. 2023. Redis. https:\/\/redis.io\/. An in-memory database that persists on disk."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceeding of the IEEE Symposium on Security and Privacy. IEEE, 38--54","author":"Schuster Felix","year":"2015","unstructured":"Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3: Trustworthy data analytics in the cloud using SGX. In Proceeding of the IEEE Symposium on Security and Privacy. IEEE, 38--54."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Seo Jaebaek","year":"2017","unstructured":"Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications With SGX Enclaves.. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_37_1","unstructured":"Phoronix Test Suite. 2023. Phoronix Test Suite. https:\/\/github.com\/phoronix-test-suite\/phoronix-test-suite. A benchmark software."},{"key":"e_1_3_2_1_38_1","unstructured":"Siddharth Syal. 2023. File Encryption Using Intel SGX. https:\/\/github.com\/siddharthsyal\/File-Encryption-Using-Intel-SGX.git."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268942"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the Computing Frontiers Conference. 35--44","author":"Tian Hongliang","year":"2017","unstructured":"Hongliang Tian, Yong Zhang, Chunxiao Xing, and Shoumeng Yan. 2017. SGXK-ernel: A library operating system optimized for Intel SGX. In Proceedings of the Computing Frontiers Conference. 35--44."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. 645--658","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the USENIX Annual Technical Conference. 645--658."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 41st IEEE Symposium on Security and Privacy. IEEE, 592--607","author":"Wang Zhe","year":"2020","unstructured":"Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang. 2020. Seimi: Efficient and secure smap-enabled intra-process memory isolation. In Proceedings of the 41st IEEE Symposium on Security and Privacy. IEEE, 592--607."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the ACM Conference on Data and Application Security and Privacy. 261--268","author":"Weiser Samuel","year":"2017","unstructured":"Samuel Weiser and Mario Werner. 2017. Sgxio: Generic trusted i\/o path for Intel SGX. In Proceedings of the ACM Conference on Data and Application Security and Privacy. 261--268."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy. 1--9.","author":"Xing Bin Cedric","year":"2016","unstructured":"Bin Cedric Xing, Mark Shanahan, and Rebekah Leslie-Hurd. 2016. Intel software guard extensions (Intel SGX) software support for dynamic memory allocation inside an enclave. In Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy. 1--9."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931070"},{"key":"e_1_3_2_1_46_1","volume-title":"SGX Switchless Calls Made Configless. arXiv preprint arXiv:2305.00763","author":"Yuhala Peterson","year":"2023","unstructured":"Peterson Yuhala, Michael Paper, Timoth\u00e9e Zerbib, Pascal Felber, Valerio Schiavoni, and Alain Tchana. 2023. SGX Switchless Calls Made Configless. arXiv preprint arXiv:2305.00763 (2023)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Zhang Yiming","year":"2023","unstructured":"Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, and Zhengyu He. 2023. SHELTER: Extending Arm CCA with Isolation in User Space. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Web Information Systems and Applications Conference. IEEE, 184--187","author":"Zhao ChongChong","year":"2016","unstructured":"ChongChong Zhao, Daniyaer Saifuding, Hongliang Tian, Yong Zhang, and ChunXiao Xing. 2016. On the performance of Intel SGX. In Proceedings of the Web Information Systems and Applications Conference. IEEE, 184--187."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. 283--298","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. 283--298."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":49,"alternative-id":["10.1145\/3634737.3657025","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3657025","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}