{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:09Z","timestamp":1773840189514,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"European Research Council","doi-asserted-by":"publisher","award":["101077577"],"award-info":[{"award-number":["101077577"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690323","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4598-4612","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Gramine-TDX: A Lightweight OS Kernel for Confidential VMs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3342-4494","authenticated-orcid":false,"given":"Dmitrii","family":"Kuvaiskii","sequence":"first","affiliation":[{"name":"Intel Labs, Neubiberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3667-3763","authenticated-orcid":false,"given":"Dimitrios","family":"Stavrakakis","sequence":"additional","affiliation":[{"name":"The University of Edinburgh &amp; Technical University of Munich, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3372-8724","authenticated-orcid":false,"given":"Kailun","family":"Qin","sequence":"additional","affiliation":[{"name":"Intel Corporation &amp; Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2346-2585","authenticated-orcid":false,"given":"Cedric","family":"Xing","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3220-5735","authenticated-orcid":false,"given":"Pramod","family":"Bhatotia","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5309-0391","authenticated-orcid":false,"given":"Mona","family":"Vij","sequence":"additional","affiliation":[{"name":"Intel Labs, Hilsboro, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Enarx: Confidential Computing with WebAssembly. https:\/\/enarx.dev\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2024. AWS Nitro Enclaves. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. Cloud vs. Edge. https:\/\/www.redhat.com\/en\/topics\/cloud-computing\/cloudvs-edge."},{"key":"e_1_3_2_1_4_1","unstructured":"2024. COCONUT SVSM. https:\/\/github.com\/coconut-svsm\/svsm."},{"key":"e_1_3_2_1_5_1","unstructured":"2024. Confidential Containers. https:\/\/github.com\/confidential-containers."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. Firecracker: Linux guest configs. https:\/\/github.com\/firecracker-microvm\/ firecracker\/tree\/main\/resources\/guest_configs."},{"key":"e_1_3_2_1_7_1","unstructured":"2024. Gramine: A library OS for Linux multi-process applications with Intel SGX support. https:\/\/github.com\/gramineproject\/gramine."},{"key":"e_1_3_2_1_8_1","unstructured":"2024. Gramine Shielded Containers. https:\/\/github.com\/gramineproject\/gsc\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2024. Intel TDX Module v1.5 TD Partitioning Architecture Specification. https: \/\/www.intel.com\/content\/www\/us\/en\/content-details\/773039\/intel-tdxmodule-v1--5-td-partitioning-architecture-specification.html."},{"key":"e_1_3_2_1_10_1","unstructured":"2024. Intel Trust Domain Extension Guest Linux Kernel Hardening Strategy. https: \/\/intel.github.io\/ccc-linux-guest-hardening-docs\/tdx-guest-hardening.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2024. Intel Trust Domain Extensions Ready For Linux 5.19 (Intel TDX). https: \/\/www.phoronix.com\/news\/Intel-TDX-For-Linux-5.19."},{"key":"e_1_3_2_1_12_1","unstructured":"2024. Intel\u00ae Trust Domain Extension Linux Guest Kernel Security Specification. https:\/\/intel.github.io\/ccc-linux-guest-hardening-docs\/security-spec.html."},{"key":"e_1_3_2_1_13_1","unstructured":"2024. libkrun: A dynamic library providing Virtualization-based process isolation capabilities. https:\/\/github.com\/containers\/libkrun."},{"key":"e_1_3_2_1_14_1","unstructured":"2024. Mystikos: Tools and runtime for launching unmodified container images in Trusted Execution Environments. https:\/\/github.com\/deislabs\/mystikos."},{"key":"e_1_3_2_1_15_1","unstructured":"2024. Virtual I\/O Device (VIRTIO). https:\/\/docs.oasis-open.org\/virtio\/virtio\/v1.3\/ virtio-v1.3.html."},{"key":"e_1_3_2_1_16_1","unstructured":"2024. What is Function-as-a-Service (FaaS)? https:\/\/www.cloudflare.com\/learning\/serverless\/glossary\/function-as-a-service-faas."},{"key":"e_1_3_2_1_17_1","volume-title":"PCI bus demystified","author":"Abbott Doug","unstructured":"Doug Abbott. 2004. PCI bus demystified. Elsevier."},{"key":"e_1_3_2_1_18_1","volume-title":"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In USENIX Security Symposium. 2435--2452","author":"Abubakar Muhammad","year":"2021","unstructured":"Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu. 2021. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In USENIX Security Symposium. 2435--2452."},{"key":"e_1_3_2_1_19_1","unstructured":"Mathieu Acher Hugo Martin Juliana Alves Pereira Arnaud Blouin Djamel Eddine Khelladi and Jean-Marc J\u00e9z\u00e9quel. 2019. Learning From Thousands of Build Failures of Linux Kernel Configurations. Technical Report."},{"key":"e_1_3_2_1_20_1","volume-title":"Obliviate: A Data Oblivious Filesystem for Intel SGX. In NDSS'18","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. Obliviate: A Data Oblivious Filesystem for Intel SGX. In NDSS'18."},{"key":"e_1_3_2_1_21_1","unstructured":"Erdem Aktas Cfir Cohen Josh Eads James Forshaw and Felix Wilhelm. 2024. Intel Trust Domain Extensions (TDX) Security Review."},{"key":"e_1_3_2_1_22_1","unstructured":"AMD. 2024. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more."},{"key":"e_1_3_2_1_23_1","volume-title":"Nimble: Rollback Protection for Confidential Cloud Services. In OSDI'23","author":"Angel Sebastian","year":"2023","unstructured":"Sebastian Angel, Aditya Basu,Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, and Sudheesh Singanamalla. 2023. Nimble: Rollback Protection for Confidential Cloud Services. In OSDI'23. 193--208."},{"key":"e_1_3_2_1_24_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In OSDI'16","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan OKeeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In OSDI'16."},{"key":"e_1_3_2_1_25_1","volume-title":"Heckler: Breaking Confidential VMs with Malicious Interrupts. In USENIX Security'24.","author":"Andrin Bertschi Shweta Shinde Mark Kuhne","year":"2024","unstructured":"Mark Kuhne Andrin Bertschi Shweta Shinde Benedict Schl\u00fcter, Supraja Sridhara. 2024. Heckler: Breaking Confidential VMs with Malicious Interrupts. In USENIX Security'24."},{"key":"e_1_3_2_1_26_1","volume-title":"OSDI'20","author":"Boos Kevin","year":"2020","unstructured":"Kevin Boos, Namitha Liyanage, Ramla Ijaz, and Lin Zhong. 2020. Theseus: an experiment in operating system structure and state management. In OSDI'20."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484779"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Pau-Chen Cheng Wojciech Ozga Enriquillo Valdez Salman Ahmed Zhongshu Gu Hani Jamjoom Hubertus Franke and James Bottomley. 2023. Intel TDX Demystified: A Top-Down Approach.","DOI":"10.1145\/3652597"},{"key":"e_1_3_2_1_29_1","unstructured":"Cfir Cohen James Forshaw Jann Horn and Mark Brand. 2022. AMD Secure Processor for Confidential Computing Security Review. Technical Report. Google Project Zero and Google Cloud Security."},{"key":"e_1_3_2_1_30_1","unstructured":"Confidential Computing Consortium. 2024. White Papers and Reports. https: \/\/confidentialcomputing.io\/resources\/white-papers-reports\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. (2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"RAID'20","author":"DeMarinis Nicholas","year":"2020","unstructured":"Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, and Vasileios P Kemerlis. 2020. Sysfilter: Automated system call filtering for commodity software. In RAID'20."},{"key":"e_1_3_2_1_33_1","volume-title":"Nova Fallen, Peter Kairouz, Albert Cheu, et al.","author":"Eichner Hubert","year":"2024","unstructured":"Hubert Eichner, Daniel Ramage, Kallista Bonawitz, Dzmitry Huba, Tiziano Santoro, Brett McLarnon, Timon Van Overveldt, Nova Fallen, Peter Kairouz, Albert Cheu, et al. 2024. Confidential Federated Computations. arXiv preprint arXiv:2404.10764 (2024)."},{"key":"e_1_3_2_1_34_1","volume-title":"Triad: Trusted Timestamps in Untrusted Environments. arXiv:2311.06156 [cs.CR]","author":"Fernandez Gabriel P.","year":"2024","unstructured":"Gabriel P. Fernandez, Andrey Brito, and Christof Fetzer. 2024. Triad: Trusted Timestamps in Untrusted Environments. arXiv:2311.06156 [cs.CR]"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560592"},{"key":"e_1_3_2_1_36_1","volume-title":"RAID'20","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, and Michalis Polychronakis. 2020. Confine: Automated system call policy generation for container attack surface reduction. In RAID'20."},{"key":"e_1_3_2_1_37_1","volume-title":"Security analysis of encrypted virtual machines. ACM SIGPLAN Notices 52, 7","author":"Hetzelt Felicitas","year":"2017","unstructured":"Felicitas Hetzelt and Robert Buhren. 2017. Security analysis of encrypted virtual machines. ACM SIGPLAN Notices 52, 7 (2017)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488011"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Benjamin Holmes Jason Waterman and Dan Williams. 2022. KASLR in the age of MicroVMs. In EuroSys'22. 149--165.","DOI":"10.1145\/3492321.3519578"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Benjamin Holmes Jason Waterman and Dan Williams. 2024. SEVeriFast: Minimizing the root of trust for fast startup of SEV microVMs. (2024).","DOI":"10.1145\/3620665.3640424"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623208"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264560.3264561"},{"key":"e_1_3_2_1_43_1","unstructured":"Intel. 2024. Intel Protected File System Library. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/overview-of-intel-protected-filesystem-library-using-software-guard-extensions.html."},{"key":"e_1_3_2_1_44_1","unstructured":"Intel. 2024. Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX). https:\/\/www.inte l.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-trust-domainextensions. html."},{"key":"e_1_3_2_1_45_1","unstructured":"The Linux Kernel. 2023. Seccomp BPF (SECure COMPuting with filters). https: \/\/www.kernel.org\/doc\/html\/latest\/userspace-api\/seccomp_filter.html"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_47_1","volume-title":"Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863","author":"Knauth Thomas","year":"2018","unstructured":"Thomas Knauth, Michael Steiner, Somnath Chakrabarti, Li Lei, Cedric Xing, and Mona Vij. 2018. Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863 (2018)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524301"},{"key":"e_1_3_2_1_49_1","volume-title":"Multik: A framework for orchestrating multiple specialized kernels. arXiv preprint arXiv:1903.06889","author":"Kuo Hsuan-Chi","year":"2019","unstructured":"Hsuan-Chi Kuo, Akshith Gunasekaran, Yeongjin Jang, Sibin Mohan, Rakesh B Bobba, David Lie, and Jesse Walker. 2019. Multik: A framework for orchestrating multiple specialized kernels. arXiv preprint arXiv:1903.06889 (2019)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Hsuan-Chi Kuo Dan Williams Ricardo Koller and Sibin Mohan. 2020. A linux in unikernel clothing. In EuroSys'20. 1--15.","DOI":"10.1145\/3342195.3387526"},{"key":"e_1_3_2_1_51_1","unstructured":"Anil Kurmus Reinhard Tartler Daniela Dorneanu Bernhard Heinloth Valentin Rothberg Andreas Ruprecht Wolfgang Schr\u00f6der-Preikschat Daniel Lohmann and R\u00fcdiger Kapitza. 2013. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. In NDSS."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59851-8_22"},{"key":"e_1_3_2_1_53_1","volume-title":"Keystone: An open framework for architecting trusted execution environments. In EuroSys'20.","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanovic, and Dawn Song. 2020. Keystone: An open framework for architecting trusted execution environments. In EuroSys'20."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Hugo Lefeuvre David Chisnall Marios Kogias and Pierre Olivier. 2023. Towards (Really) Safe and Fast Confidential I\/O. In HotOS'23.","DOI":"10.1145\/3593856.3595913"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX ATC'23","author":"Li Dingji","year":"2023","unstructured":"Dingji Li, Zeyu Mi, Chenhui Ji, Yifan Tan, Binyu Zang, Haibing Guan, and Haibo Chen. 2023. Bifrost: Analysis and Optimization of Network I\/O Tax in Confidential Virtual Machines. In USENIX ATC'23."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485253"},{"key":"e_1_3_2_1_58_1","unstructured":"Mengyuan Li Yinqian Zhang Zhiqiang Lin and Yan Solihin. 2019. Exploiting Unprotected I\/O Operations in AMDs Secure Encrypted Virtualization. In USENIX Security'19."},{"key":"e_1_3_2_1_59_1","volume-title":"CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In USENIX Security'21.","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In USENIX Security'21."},{"key":"e_1_3_2_1_60_1","volume-title":"Design and Verification of the Arm Confidential Compute Architecture. In OSDI'22","author":"Li Xupeng","year":"2022","unstructured":"Xupeng Li, Xuheng Li, Christoffer Dall, Ronghui Gu, Jason Nieh, Yousuf Sait, and Gareth Stockwell. 2022. Design and Verification of the Arm Confidential Compute Architecture. In OSDI'22."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_62_1","volume-title":"Luc Lesoil, Jean-Marc J\u00e9z\u00e9quel, and Djamel Eddine Khelladi.","author":"Martin Hugo","year":"2022","unstructured":"Hugo Martin, Mathieu Acher, Juliana Alves Pereira, Luc Lesoil, Jean-Marc J\u00e9z\u00e9quel, and Djamel Eddine Khelladi. 2022. Transfer Learning Across Variants and Versions: The Case of Linux Kernel Size. IEEE Transactions on Software Engineering (2022)."},{"key":"e_1_3_2_1_63_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. In USENIX Security'17.","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In USENIX Security'17."},{"key":"e_1_3_2_1_64_1","volume-title":"Innovative Instructions and Software Model for Isolated Execution. In HASP'13","author":"McKeen Frank","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative Instructions and Software Model for Isolated Execution. In HASP'13."},{"key":"e_1_3_2_1_65_1","volume-title":"Attestation Mechanisms for Trusted Execution Environments Demystified. In DAIS'22","author":"M\u00e9n\u00e9trey J\u00e4mes","year":"2022","unstructured":"J\u00e4mes M\u00e9n\u00e9trey, Christian G\u00f6ttel, Anum Khurshid, Marcelo Pasin, Pascal Felber, Valerio Schiavoni, and Shahid Raza. 2022. Attestation Mechanisms for Trusted Execution Environments Demystified. In DAIS'22."},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Computational Science and Its Applications (ICCSA).","author":"Subhas","unstructured":"Subhas C. Misra and Virendra C. Bhavsar. 2003. Relationships between Selected Software Measures and Latent Bug-Density: Guidelines for Improving Quality. In International Conference on Computational Science and Its Applications (ICCSA)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00063"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00025"},{"key":"e_1_3_2_1_71_1","volume-title":"NetKernel: Making Network Stack Part of the Virtualized Infrastructure. In USENIX ATC'20","author":"Niu Zhixiong","year":"2020","unstructured":"Zhixiong Niu, Hong Xu, Peng Cheng, Qiang Su, Yongqiang Xiong, Tao Wang, Dongsu Han, and Keith Winstein. 2020. NetKernel: Making Network Stack Part of the Virtualized Infrastructure. In USENIX ATC'20."},{"key":"e_1_3_2_1_72_1","volume-title":"SSL and TLS: Theory and Practice","author":"Oppliger Rolf","unstructured":"Rolf Oppliger. 2023. SSL and TLS: Theory and Practice. Artech House."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428203"},{"key":"e_1_3_2_1_74_1","volume-title":"SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. arXiv preprint arXiv:1908.11143 (2019)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433667.3433668"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Luigi Rizzo Giuseppe Lettieri and Vincenzo Maffione. 2013. Speeding up packet I\/O in virtual machines. In Architectures for Networking and Comm. Systems.","DOI":"10.1109\/ANCS.2013.6665175"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"e_1_3_2_1_78_1","volume-title":"Toward Confidential Cloud Computing. Communications ACM","author":"Russinovich Mark","year":"2021","unstructured":"Mark Russinovich, Manuel Costa, C\u00e9dric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, and Vikas Bhatia. 2021. Toward Confidential Cloud Computing. Communications ACM (2021)."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087421"},{"key":"e_1_3_2_1_80_1","unstructured":"Sergej Schumilo Cornelius Aschermann Robert Gawlik Sebastian Schinzel and Thorsten Holz. 2017. kAFL:Hardware-Assisted feedback fuzzing for OS kernels. In USENIX Security'17."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304016"},{"key":"e_1_3_2_1_83_1","unstructured":"Kirill Shutemov. 2023. x86\/coco: Disable 32-bit emulation by default on TDX and SEV."},{"key":"e_1_3_2_1_84_1","unstructured":"Reinhard Tartler Anil Kurmus Bernhard Heinloth Valentin Rothberg Andreas Ruprecht Daniela Dorneanu R\u00fcdiger Kapitza Wolfgang Schr\u00f6der-Preikschat and Daniel Lohmann. 2012. Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability. In HotDep'12."},{"key":"e_1_3_2_1_85_1","unstructured":"Google Cloud team. 2024. Confidential Computing. https:\/\/cloud.google.com\/c onfidential-computing."},{"key":"e_1_3_2_1_86_1","unstructured":"IBM Cloud team. 2024. Confidential Computing. https:\/\/www.ibm.com\/cloud\/confidential-computing."},{"key":"e_1_3_2_1_87_1","unstructured":"Microsoft Azure team. 2024. Azure Confidential Computing Overview. https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/overview."},{"key":"e_1_3_2_1_88_1","volume-title":"Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter.","author":"Tsai Chia-Che","year":"2014","unstructured":"Chia-Che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter. 2014. Cooperation and Security Isolation of Library OSes for Multi-Process Applications. In EuroSys'14."},{"key":"e_1_3_2_1_89_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In USENIX ATC'17","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In USENIX ATC'17."},{"key":"e_1_3_2_1_90_1","volume-title":"Tsirkin and Stefan Hajnoczi","author":"Michael","year":"2023","unstructured":"Michael S. Tsirkin and Stefan Hajnoczi. 2023. Trust, confidentiality, and hardening: the virtio lessons. https:\/\/lpc.events\/event\/17\/contributions\/1516\/"},{"key":"e_1_3_2_1_91_1","volume-title":"FAST'17","author":"Reddy Vangoor Bharath Kumar","year":"2017","unstructured":"Bharath Kumar Reddy Vangoor, Vasily Tarasov, and Erez Zadok. 2017. To FUSE or not to FUSE: Performance of User-Space file systems. In FAST'17."},{"key":"e_1_3_2_1_92_1","volume-title":"NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. arXiv","author":"Wang Wenhao","year":"2024","unstructured":"Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, and Rui Hou. 2024. NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. arXiv (2024)."},{"key":"e_1_3_2_1_93_1","volume-title":"Towards Modular Trusted Execution Environments. In Workshop on System Software for Trusted Execution.","author":"Weinhold Carsten","year":"2023","unstructured":"Carsten Weinhold, Nils Asmussen, Diana G\u00f6hringer, and Michael Roitzsch. 2023. Towards Modular Trusted Execution Environments. In Workshop on System Software for Trusted Execution."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Jan Werner Joshua Mason Manos Antonakakis Michalis Polychronakis and Fabian Monrose. 2019. The severest of them all: Inference attacks against secure virtual enclaves. In AsiaCCS'19.","DOI":"10.1145\/3321705.3329820"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00080"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00064"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.10"},{"key":"e_1_3_2_1_98_1","volume-title":"KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels. In RAID.","author":"Zhang Zhi","year":"2018","unstructured":"Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, and Fethi Rabhi. 2018. KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels. In RAID."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833694"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690323","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:06:38Z","timestamp":1755842798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":99,"alternative-id":["10.1145\/3658644.3690323","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690323","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}