{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:44:27Z","timestamp":1772041467284,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700759","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privagic: automatic code partitioning with explicit secure typing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3852-6390","authenticated-orcid":false,"given":"Subashiny","family":"Tanigassalame","sequence":"first","affiliation":[{"name":"Inria Saclay, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5437-0846","authenticated-orcid":false,"given":"Yohan","family":"Pipereau","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com SudParis - Institut Polytechnique de Paris, Evry, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3234-6774","authenticated-orcid":false,"given":"Adam","family":"Chader","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com SudParis - Institut Polytechnique de Paris, Evry, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3689-6546","authenticated-orcid":false,"given":"Jana","family":"Toljaga","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com SudParis - Institut Polytechnique de Paris, Evry, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9444-1071","authenticated-orcid":false,"given":"Ga\u00ebl","family":"Thomas","sequence":"additional","affiliation":[{"name":"Inria Saclay, Palaiseau, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"2006","unstructured":"Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2006. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley, USA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22496-7_9"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2022. AWS nitro system. https:\/\/aws.amazon.com\/ec2\/nitro\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Program Analysis and Specialization for the C Programming Language. Ph. D. Dissertation","author":"Andersen Lars Ole","unstructured":"Lars Ole Andersen. 1994. Program Analysis and Specialization for the C Programming Language. Ph. D. Dissertation. Johns Hopkins University."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the conference on Operating Systems Design and Implementation, OSDI '16","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proceedings of the conference on Operating Systems Design and Implementation, OSDI '16. 689--703."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Workshop on Aliasing, Confinement and Ownership in object-oriented programming. 8.","author":"Barnett Mike","year":"2007","unstructured":"Mike Barnett, Manuel Fahndrich, Francesco Logozzo, and Diego Garbervetsky. 2007. Annotations for (more) Precise Points-to Analysis. In Proceedings of the International Workshop on Aliasing, Confinement and Ownership in object-oriented programming. 8."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the conference on Operating Systems Design and Implementation, OSDI '14","author":"Baumann Andrew","year":"2014","unstructured":"Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In Proceedings of the conference on Operating Systems Design and Implementation, OSDI '14. 267--283."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the USENIX Security Symposium '04","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proceedings of the USENIX Security Symposium '04. 5."},{"key":"e_1_3_2_1_10_1","unstructured":"David B\u00fchler Pascal Cuoq Boris Yakobowski Matthieu Lemerre Andr\u00e9 Maroneze Valentin Perelle and Virgile Prevosto. [n. d.]. Eva - The Evolved Value Analysis plug-in. http:\/\/frama-c.com\/download\/frama-c-eva-manual.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Cloud. 2022. Confidential computing. https:\/\/cloud.google.com\/confidential-computing"},{"key":"e_1_3_2_1_14_1","unstructured":"Confidential Computing Consortium. 2022. Confidential computing - open source community. https:\/\/confidentialcomputing.io\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_16_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016 (2016), 86.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349309"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Usenix Annual Technical Conference, USENIX ATC '19","author":"Ghosn Adrien","year":"2019","unstructured":"Adrien Ghosn, James R. Larus, and Edouard Bugnion. 2019. Secured Routines: Language-based Construction of Trusted Execution Environments. In Proceedings of the Usenix Annual Technical Conference, USENIX ATC '19. 571--586."},{"key":"e_1_3_2_1_21_1","volume-title":"Revised Reprint","author":"Herlihy Maurice","unstructured":"Maurice Herlihy and Nir Shavit. 2012. The Art of Multiprocessor Programming, Revised Reprint (1st ed.). Morgan Kaufmann.","edition":"1"},{"key":"e_1_3_2_1_23_1","volume-title":"Glamdring: Automatic Application Partitioning for Intel SGX. In Proceedings of the Usenix Annual Technical Conference, USENIX ATC '17","author":"Lind Joshua","unstructured":"Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Christof Fetzer, and Peter Pietzuch. [n. d.]. Glamdring: Automatic Application Partitioning for Intel SGX. In Proceedings of the Usenix Annual Technical Conference, USENIX ATC '17. 285--298."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_1_26_1","volume-title":"Trellis: Privilege Separation for Multi-User Applications Made Easy. In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 437--456","author":"Mambretti Andrea","unstructured":"Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, and Stefano Zanero. [n. d.]. Trellis: Privilege Separation for Multi-User Applications Made Easy. In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 437--456."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00025"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.8"},{"key":"e_1_3_2_1_29_1","unstructured":"Microsoft. 2022. Microsoft Azure confidential computing. https:\/\/azure.microsoft.com\/en-gb\/solutions\/confidential-compute\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_32_1","volume-title":"SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143 (2019)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the conference on Object Oriented Programming Systems Languages and Applications, OOPSLA '21","author":"Rountev Atanas","unstructured":"Atanas Rountev, Ana Milanova, and Barbara G. Ryder. 2001. Points-to Analysis for Java Using Annotated Constraints. In Proceedings of the conference on Object Oriented Programming Systems Languages and Applications, OOPSLA '21. 43--55."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884817"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274823"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23500"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57916-5_7"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the Usenix Annual Technical Conference, USENIX ATC '17","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In Proceedings of the Usenix Annual Technical Conference, USENIX ATC '17. 645--658."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the USENIX Security Symposium '20","author":"Tsai Chia-Che","unstructured":"Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, and Donald E. Porter. 2020. Civet: An Efficient Java Partitioning Framework for Hardware Enclaves. In Proceedings of the USENIX Security Symposium '20. 505--522."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080208"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360610"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693091"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590140.3629116"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464298.3493406"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00032"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy, SSP '03","author":"Zheng Lantian","year":"2003","unstructured":"Lantian Zheng, Stephen Chong, Andrew C. Myers, and Steve Zdancewic. 2003. Using Replication and Partitioning to Build Secure Distributed Systems. In Proceedings of the IEEE Symposium on Security and Privacy, SSP '03. 236."}],"event":{"name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong","acronym":"Middleware '24","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":49,"alternative-id":["10.1145\/3652892.3700759","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700759","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}