{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:17:06Z","timestamp":1763968626851,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3676641.3716266","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:47:32Z","timestamp":1743094052000},"page":"814-830","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["<scp>Pave:<\/scp>\n            Information Flow Control for Privacy-preserving Online Data Processing Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8312-0275","authenticated-orcid":false,"given":"Minkyung","family":"Park","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5493-9174","authenticated-orcid":false,"given":"Jaeseung","family":"Choi","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0361-6532","authenticated-orcid":false,"given":"Hyeonmin","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7795-0077","authenticated-orcid":false,"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Network and Distributed System Security Symposium","author":"Ahmad Adil","year":"2019","unstructured":"Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee. Obfuscuro: A commodity obfuscation engine on intel sgx. In Network and Distributed System Security Symposium, 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24057"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23284"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00066"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427270"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00008"},{"key":"e_1_3_2_1_7_1","first-page":"333","volume-title":"Proceedings 13","author":"Askarov Aslan","year":"2008","unstructured":"Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. Termination-insensitive noninterference leaks more than just a bit. In Computer Security-ESORICS 2008: 13th European Symposium on Research in Computer Security, M\u00e1laga, Spain, October 6--8, 2008. Proceedings 13, pages 333--348. Springer, 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103677"},{"key":"e_1_3_2_1_9_1","volume-title":"November","author":"Authors Guest","year":"2020","unstructured":"Guest Authors. The threats you're facing when using free online converters and how to avoid them, November 2020. [Online]. Available: https:\/\/www.techwalls.com\/threats-free-online-convertershow-to-avoid\/ (Retrieved, Apr 16, 2024)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268954"},{"key":"e_1_3_2_1_11_1","unstructured":"Eleanor Jane Birrell. A Reactive Approach for Use-Based Privacy. PhD thesis Cornell University 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49635-0_2"},{"key":"e_1_3_2_1_13_1","first-page":"3917","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Borrello Pietro","year":"2022","unstructured":"Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, and Michael Schwarz. {\u00c6PIC} leak: Architecturally leaking uninitialized data from the microarchitecture. In 31st USENIX Security Symposium (USENIX Security 22), pages 3917--3934, 2022."},{"key":"e_1_3_2_1_14_1","volume-title":"Apr 15, 2024).","author":"Boucher Nicholas","year":"2019","unstructured":"Nicholas Boucher. Multi-domain sfi, May 2019. [ONLINE]. Available: https:\/\/github.com\/nickboucher\/Multi-Domain-SFI\/blob\/master\/paper\/Multi%20Domain%20SFI.pdf (Retrieved, Apr 15, 2024)."},{"key":"e_1_3_2_1_15_1","first-page":"11","volume-title":"WOOT","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. Software grand exposure: Sgx cache attacks are practical. In WOOT, pages 11--11, 2017."},{"key":"e_1_3_2_1_16_1","first-page":"249","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin Von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. A systematic evaluation of transient execution attacks and defenses. In 28th USENIX Security Symposium (USENIX Security 19), pages 249--266, 2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.50"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297469"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451145"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"volume-title":"Apr 15","year":"2024","key":"e_1_3_2_1_23_1","unstructured":"Chromium. Google privacy sandbox. [Online]. Available: https:\/\/www.chromium.org\/Home\/chromium-privacy\/privacy-sandbox (Retrieved, Apr 15, 2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130495"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_29_1","volume-title":"September","author":"Ducklin Paul","year":"2017","unstructured":"Paul Ducklin. Online file conversion services -- why trust them?, September 2017. [Online]. Available: https:\/\/news.sophos.com\/enus\/2017\/09\/01\/online-file-conversion-services-why-trust-them\/ (Retrieved, Apr 15, 2024)."},{"key":"e_1_3_2_1_30_1","first-page":"637","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Elnikety Eslam","year":"2016","unstructured":"Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, and Peter Druschel. Thoth: Comprehensive policy compliance in data retrieval systems. In 25th USENIX Security Symposium (USENIX Security 16), pages 637--654, 2016."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173204"},{"key":"e_1_3_2_1_32_1","first-page":"531","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. Flowfence: Practical data protection for emerging iot application frameworks. In 25th USENIX Security Symposium (USENIX Security 16), pages 531--548, 2016."},{"volume-title":"Apr 16","year":"2024","key":"e_1_3_2_1_33_1","unstructured":"Flac. [Online]. Available: https:\/\/xiph.org\/flac\/ (Retrieved, Apr 16, 2024)."},{"key":"e_1_3_2_1_34_1","volume-title":"Dec","author":"Fowler Jeremiah","year":"2020","unstructured":"Jeremiah Fowler. Fotor photo editing app leaked 13 million users' info online, Dec 2020. [Online]. Available: https:\/\/securitydiscovery.com\/fotor-photo-editing-app-leaked-13-million-users-info-online\/ (Retrieved, Apr 13, 2024)."},{"volume-title":"Apr 16","year":"2024","key":"e_1_3_2_1_35_1","unstructured":"Giflib. [Online]. Available: https:\/\/giflib.sourceforge.net\/ (Retrieved, Apr 16, 2024)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_37_1","first-page":"955","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. Translation leak-aside buffer: Defeating cache side-channel protections with tlb attacks. In 27th USENIX Security Symposium (USENIX Security 18), pages 955--972, 2018."},{"key":"e_1_3_2_1_38_1","first-page":"217","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. Strong and efficient cache side-channel protection using hardware transactional memory. In 26th USENIX Security Symposium (USENIX Security 17), pages 217--233, 2017."},{"key":"e_1_3_2_1_39_1","first-page":"169","volume-title":"USENIX conference on Networked systems design and implementation","author":"Guha Saikat","year":"2011","unstructured":"Saikat Guha, Bin Cheng, and Paul Francis. Privad: Practical privacy in online advertising. In USENIX conference on Networked systems design and implementation, pages 169--182, 2011."},{"key":"e_1_3_2_1_40_1","volume-title":"Ryoan: A distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS), 35(4):13","author":"Hunt Tyler","year":"2018","unstructured":"Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. Ryoan: A distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS), 35(4):13, 2018."},{"key":"e_1_3_2_1_41_1","first-page":"321","volume-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Huo Tianlin","year":"2020","unstructured":"Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, and Mingshu Li. Bluethunder: A 2-level directional predictor based side-channel attack against sgx. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 321--347, 2020."},{"volume-title":"November 6","year":"2024","key":"e_1_3_2_1_42_1","unstructured":"Intel. Intel processors supporting intel sgx. [Online]. Available: https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-andtechnology\/software-guard-extensions-processors.html (Retrieved, November 6, 2024)."},{"key":"e_1_3_2_1_43_1","first-page":"1445","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. V0ltpwn: Attacking x86 processor integrity from software. In Proceedings of the 29th USENIX Conference on Security Symposium, pages 1445--1461, 2020."},{"key":"e_1_3_2_1_44_1","first-page":"1469","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Kim Hyungseok","year":"2023","unstructured":"Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, and Sang Kil Cha. Reassembly is hard: a reflection on challenges and strategies. In 32nd USENIX Security Symposium (USENIX Security 23), pages 1469--1486, 2023."},{"key":"e_1_3_2_1_45_1","volume-title":"Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863","author":"Knauth Thomas","year":"2018","unstructured":"Thomas Knauth, Michael Steiner, Somnath Chakrabarti, Li Lei, Cedric Xing, and Mona Vij. Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863, 2018."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_47_1","volume-title":"January","author":"KIM KOMANDO.","year":"2021","unstructured":"KIM KOMANDO. 1.9 million records leaked after online photo editor hacked, January 2021. [Online]. Available: https: \/\/www.komando.com\/security-privacy\/pixlr-data-leak\/774844\/ (Retrieved, Apr 14, 2024)."},{"key":"e_1_3_2_1_48_1","volume-title":"WOOT@ USENIX Security Symposium","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh, Khaled N Khasawneh, Chengyu Song, and Nael B Abu-Ghazaleh. Spectre returns! speculation attacks using the return stack buffer. In WOOT@ USENIX Security Symposium, 2018."},{"key":"e_1_3_2_1_49_1","first-page":"523","volume-title":"26th USENIX Security Symposium (USENIX Security","author":"Lee Jaehyuk","year":"2017","unstructured":"Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent ByungHoon Kang. Hacking in darkness: Return-oriented programming against secure enclaves. In 26th USENIX Security Symposium (USENIX Security , pages 523--539, Vancouver, BC, August 2017. USENIX Association."},{"key":"e_1_3_2_1_50_1","first-page":"557","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. Inferring fine-grained control flow inside sgx enclaves with branch shadowing. In 26th USENIX Security Symposium (USENIX Security 17), pages 557--574, 2017."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648584.2648590"},{"key":"e_1_3_2_1_52_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher,Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown. arXiv preprint arXiv:1801.01207, 2018."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_54_1","first-page":"18","article-title":"Privacy policy compliance using trusted hardware","volume":"1","author":"Mazmudar Miti","year":"2020","unstructured":"Miti Mazmudar and Ian Goldberg. Mitigator: Privacy policy compliance using trusted hardware. Proceedings on Privacy Enhancing Technologies, 1:18, 2020.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_55_1","first-page":"69","volume-title":"International Conference on Cryptographic Hardware and Embedded Systems","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. Cachezoom: How sgx amplifies the power of cache attacks. In International Conference on Cryptographic Hardware and Embedded Systems, pages 69--90. Springer, 2017."},{"key":"e_1_3_2_1_56_1","first-page":"469","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. Copycat: Controlled instruction-level attacks on enclaves. In 29th USENIX Security Symposium (USENIX Security 20), pages 469--486, 2020."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3185979"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680301"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00034"},{"key":"e_1_3_2_1_61_1","first-page":"227","volume-title":"2018 Usenix Annual Technical Conference (USENIX ATC 18)","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. Varys: Protecting sgx enclaves from practical sidechannel attacks. In 2018 Usenix Annual Technical Conference (USENIX ATC 18), pages 227--240, 2018."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387541"},{"key":"e_1_3_2_1_63_1","first-page":"565","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. Drama: Exploiting dram addressing for cross-cpu attacks. In 25th USENIX Security Symposium (USENIX Security 16), pages 565--581, 2016."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300040"},{"key":"e_1_3_2_1_65_1","volume-title":"Apr 15","author":"Project GNU","year":"2024","unstructured":"GNU Project. Gzip. [Online]. Available: http:\/\/www.gnu.org\/software\/gzip\/ (Retrieved, Apr 15, 2024)."},{"key":"e_1_3_2_1_66_1","first-page":"663","volume-title":"USENIX Security Symposium","author":"Puddu Ivan","year":"2021","unstructured":"Ivan Puddu, Moritz Schneider, Miro Haller, and Srdjan Capkun. Frontal attack: Leaking control-flow in sgx via the cpu frontend. In USENIX Security Symposium, pages 663--680, 2021."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150541"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_1_69_1","first-page":"431","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. Raccoon: Closing digital side-channels through obfuscated execution. In 24th USENIX Security Symposium (USENIX Security 15), pages 431--446, 2015."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3609026.3609731"},{"key":"e_1_3_2_1_71_1","volume-title":"Supporting third party attestation for intel sgx with intel data center attestation primitives. White paper, 12","author":"Scarlata Vinnie","year":"2018","unstructured":"Vinnie Scarlata, Simon Johnson, James Beaney, and Piotr Zmijewski. Supporting third party attestation for intel sgx with intel data center attestation primitives. White paper, 12, 2018."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243806"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_75_1","first-page":"279","volume-title":"Proceedings, Part I 24","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, and Daniel Gruss. Netspectre: Read arbitrary memory over network. In Computer Security--ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23--27, 2019, Proceedings, Part I 24, pages 279--299. Springer, 2019."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_77_1","volume-title":"Practical timing side channel attacks on memory compression. arXiv preprint arXiv:2111.08404","author":"Schwarzl Martin","year":"2021","unstructured":"Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna M\u00fcller, Michael Schwarz, and Daniel Gruss. Practical timing side channel attacks on memory compression. arXiv preprint arXiv:2111.08404, 2021."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929822"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_81_1","volume-title":"Viswesh Narayanan, and Prateek Saxena. Preventing your faults from telling your secrets: Defenses against pigeonhole attacks. arXiv preprint arXiv:1506.04832","author":"Shinde Shweta","year":"2015","unstructured":"Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, and Prateek Saxena. Preventing your faults from telling your secrets: Defenses against pigeonhole attacks. arXiv preprint arXiv:1506.04832, 2015."},{"key":"e_1_3_2_1_82_1","volume-title":"The heisenberg defense: Proactively defending sgx enclaves against page-table-based side-channel attacks. arXiv preprint arXiv:1712.08519","author":"Strackx Raoul","year":"2017","unstructured":"Raoul Strackx and Frank Piessens. The heisenberg defense: Proactively defending sgx enclaves against page-table-based side-channel attacks. arXiv preprint arXiv:1712.08519, 2017."},{"key":"e_1_3_2_1_83_1","volume-title":"Apr 15","author":"Ffmpeg Fmpeg","year":"2024","unstructured":"FFmpeg team. Ffmpeg. [Online]. Available: https:\/\/ffmpeg.org\/ (Retrieved, Apr 15, 2024)."},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings Network and Distributed System Symposium","author":"Toubiana Vincent","year":"2010","unstructured":"Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy preserving targeted advertising. In Proceedings Network and Distributed System Symposium, 2010."},{"key":"e_1_3_2_1_85_1","first-page":"645","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald E Porter, and Mona Vij. Graphene-sgx: A practical library os for unmodified applications on sgx. In 2017 USENIX Annual Technical Conference (USENIX ATC 17), pages 645--658, 2017."},{"key":"e_1_3_2_1_86_1","first-page":"991","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, OfirWeisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas FWenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the intel sgx kingdom with transient out-of-order execution. In 27th USENIX Security Symposium (USENIX Security 18), pages 991--1008, 2018."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_1_90_1","first-page":"1041","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In Proceedings of the 26th USENIX Security Symposium, pages 1041--1056. USENIX Association, 2017."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00064"},{"key":"e_1_3_2_1_93_1","first-page":"615","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Wang Frank","year":"2019","unstructured":"Frank Wang, Ronny Ko, and James Mickens. Riverbed: enforcing user-defined privacy constraints in distributed web services. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pages 615--630, 2019."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_96_1","volume-title":"September","author":"Whittaker Zack","year":"2017","unstructured":"Zack Whittaker. A server hosting dozens of popular file converter sites has been hacked, September 2017. [Online]. Available: https:\/\/www.zdnet.com\/article\/dozens-of-online-file-convertersites-are-unsafe-to-use-warns-researcher\/ (Retrieved, Apr 14, 2024)."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623633"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Rotterdam Netherlands","acronym":"ASPLOS '25"},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676641.3716266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:12:51Z","timestamp":1755774771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":99,"alternative-id":["10.1145\/3676641.3716266","10.1145\/3676641"],"URL":"https:\/\/doi.org\/10.1145\/3676641.3716266","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}