{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:15:46Z","timestamp":1754144146550,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","funder":[{"name":"SAP SE"},{"name":"National Research Center for Applied Cybersecurity ATHENE","award":["HiPeAC"],"award-info":[{"award-number":["HiPeAC"]}]},{"name":"Hessisches Ministerium f\u00fcr Wissenschaft und Forschung, Kunst und Kultur","award":["LOEWE Spitzenprofessur"],"award-info":[{"award-number":["LOEWE Spitzenprofessur"]}]},{"name":"Hessian Center for Artificial Intelligence (hessian.AI)"},{"name":"Deutsches Forschungszentrum f\u00fcr K\u00fcnstliche Intelligenz (DFKI)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1145\/3736227.3736234","type":"proceedings-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T08:03:02Z","timestamp":1752134582000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of AWS Nitro Enclaves for Database Workloads"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7889-8152","authenticated-orcid":false,"given":"Adrian","family":"Lutsch","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1286-9359","authenticated-orcid":false,"given":"Christian","family":"Franck","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5295-1316","authenticated-orcid":false,"given":"Muhammad","family":"El-Hindi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-8573","authenticated-orcid":false,"given":"Zsolt","family":"Istv\u00e1n","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2744-7836","authenticated-orcid":false,"given":"Carsten","family":"Binnig","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany and DFKI, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Advanced Micro Devices Inc.2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/epyc-business-docs\/solution-briefs\/amd-secure-encrypted-virtualization-solution-brief.pdf"},{"key":"e_1_3_3_1_3_2","unstructured":"Amazon Web Services. 2024. The Security Design of the AWS Nitro System. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/security-design-of-aws-nitro-system\/security-design-of-aws-nitro-system.html"},{"key":"e_1_3_3_1_4_2","unstructured":"Amazon Web Services. 2025. Aws-Nitro-Enclaves-Cli\/Vsock_proxy\/README.Md. https:\/\/github.com\/aws\/aws-nitro-enclaves-cli\/blob\/main\/vsock_proxy\/README.md"},{"key":"e_1_3_3_1_5_2","unstructured":"Amazon Web Services. 2025. Aws\/Aws-Nitro-Enclaves-Cli. Amazon Web Services. https:\/\/github.com\/aws\/aws-nitro-enclaves-cli"},{"key":"e_1_3_3_1_6_2","unstructured":"Amazon Web Services. 2025. What Is Nitro Enclaves? - AWS. https:\/\/docs.aws.amazon.com\/enclaves\/latest\/user\/nitro-enclave.html"},{"key":"e_1_3_3_1_7_2","unstructured":"Amazon Web Services. 2025. Working with Multiple Enclaves - AWS. https:\/\/docs.aws.amazon.com\/enclaves\/latest\/user\/multiple-enclaves.html"},{"key":"e_1_3_3_1_8_2","unstructured":"Anjuna Security Inc.2025. Anjuna Seaglass | Universal Confidential Computing. https:\/\/www.anjuna.io\/product\/seaglass"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3662010.3663447"},{"key":"e_1_3_3_1_10_2","unstructured":"Marion Bonnet. 2023. Cloud Assets the Biggest Targets for Cyberattacks as Data Breaches Increase | Thales Group. https:\/\/www.thalesgroup.com\/en\/worldwide\/security\/press_release\/cloud-assets-biggest-targets-cyberattacks-data-breaches-increase"},{"key":"e_1_3_3_1_11_2","unstructured":"David Bronleewe Hormuzd Khosravi Shanmathi Rajasekar Shiny Sebastian and Raghuram Yeluri. 2025. Runtime Encryption of Memory with Intel\u00ae Total Memory Encryption\u2013Multi-Key (Intel\u00ae TME-MK). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/news\/runtime-encryption-of-memory-with-intel-tme-mk.html"},{"key":"e_1_3_3_1_12_2","unstructured":"David Brown. 2021. Confidential Computing: An AWS Perspective | AWS Security Blog. https:\/\/aws.amazon.com\/blogs\/security\/confidential-computing-an-aws-perspective\/"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Pau-Chen Cheng Wojciech Ozga Enriquillo Valdez Salman Ahmed Zhongshu Gu Hani Jamjoom Hubertus Franke and James Bottomley. 2024. Intel TDX Demystified: A Top-Down Approach. ACM Comput. Surv. 56 9 (April 2024) 238:1\u2013238:33. doi:10.1145\/3652597","DOI":"10.1145\/3652597"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Luigi Coppolino Salvatore D\u2019Antonio Giovanni Mazzeo and Luigi Romano. 2025. An Experimental Evaluation of TEE Technology: Benchmarking Transparent Approaches Based on SGX SEV and TDX. Computers & Security 154 (July 2025) 104457. doi:10.1016\/j.cose.2025.104457","DOI":"10.1016\/j.cose.2025.104457"},{"key":"e_1_3_3_1_15_2","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"e_1_3_3_1_16_2","unstructured":"dest-unreach.org. 2025. Socat. http:\/\/www.dest-unreach.org\/socat\/"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533737.3535098"},{"key":"e_1_3_3_1_18_2","unstructured":"Evervault Inc.2025. Evervault Enclaves. https:\/\/evervault.com\/products\/enclaves"},{"key":"e_1_3_3_1_19_2","unstructured":"Amery Hung and Bobby Eshleman. 2023. VSOCK: From Convenience to Performant VirtIO Communication. https:\/\/lpc.events\/event\/17\/contributions\/1626\/attachments\/1334\/2674\/VSOCK_%20From%20Convenience%20to%20Performant%20VirtIO%20Communication.pdf"},{"key":"e_1_3_3_1_20_2","unstructured":"Intel Corporation. 2023. Intel\u00ae TDX Connect Architecture Specification. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/773614"},{"key":"e_1_3_3_1_21_2","unstructured":"Intel Corporation. 2024. Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX) Module TD Partitioning Architecture Specification. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/773039"},{"key":"e_1_3_3_1_22_2","first-page":"516","volume-title":"Proceedings 28th International Conference on Extending Database Technology, EDBT 2025, Barcelona, Spain, March 25-28, 2025","author":"Lutsch Adrian","year":"2025","unstructured":"Adrian Lutsch, Muhammad El-Hindi, Matthias Heinrich, Daniel Ritter, Zsolt Istv\u00e1n, and Carsten Binnig. 2025. Benchmarking Analytical Query Processing in Intel SGXv2. In Proceedings 28th International Conference on Extending Database Technology, EDBT 2025, Barcelona, Spain, March 25-28, 2025, Alkis Simitsis, Bettina Kemme, Anna Queralt, Oscar Romero, and Petar Jovanovic (Eds.). OpenProceedings.org, Konstanz, Germany, 516\u2013528. doi:10.48786\/EDBT.2025.41"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Adrian Lutsch Muhammad El-Hindi Zsolt Istv\u00e1n and Carsten Binnig. 2025. Towards High-performance and Trusted Cloud DBMSs. Datenbank-Spektrum 25 1 (March 2025) 39\u201350. doi:10.1007\/s13222-025-00495-8","DOI":"10.1007\/s13222-025-00495-8"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Kajetan Maliszewski Jorge-Arnulfo Quian\u00e9-Ruiz Jonas Traub and Volker Markl. 2021. What Is the Price for Joining Securely? Benchmarking Equi-Joins in Trusted Execution Environments. Proceedings of the VLDB Endowment 15 3 (Nov. 2021) 659\u2013672. doi:10.14778\/3494124.3494146","DOI":"10.14778\/3494124.3494146"},{"key":"e_1_3_3_1_25_2","unstructured":"Marlin Foundation. 2025. Oyster-Monorepo\/Networking. https:\/\/github.com\/marlinprotocol\/oyster-monorepo\/tree\/master\/networking"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3662010.3663440"},{"key":"e_1_3_3_1_29_2","unstructured":"Redis Ltd.2025. Redis Benchmark. https:\/\/redis.io\/docs\/latest\/operate\/oss_and_stack\/management\/optimization\/benchmarks\/"},{"key":"e_1_3_3_1_30_2","unstructured":"Various Authors. 2025. iPerf - The TCP UDP and SCTP Network Bandwidth Measurement Tool. https:\/\/iperf.fr\/"},{"key":"e_1_3_3_1_31_2","unstructured":"Zack Whittaker. 2023. Danish Cloud Host Says Customers \u2019lost All Data\u2019 after Ransomware Attack. https:\/\/techcrunch.com\/2023\/08\/23\/cloudnordic-azero-cloud-host-ransomware\/"},{"key":"e_1_3_3_1_32_2","unstructured":"Philipp Winter Ralph Giles Moritz Schafhuber and Hamed Haddadi. 2023. Nitriding: A Tool Kit for Building Scalable Networked Secure Enclaves. arxiv:https:\/\/arXiv.org\/abs\/2206.04123\u00a0[cs] http:\/\/arxiv.org\/abs\/2206.04123"},{"key":"e_1_3_3_1_33_2","unstructured":"Eugene Yakubovich. 2022. Introducing Enclaver: An Open-Source Tool for Building Testing and Running Code within Secure Enclaves. https:\/\/edgebit.io\/blog\/enclaver\/"},{"key":"e_1_3_3_1_34_2","unstructured":"Xinying Yang Cong Yue Wenhui Zhang Yang Liu B. Ooi and Jianjun Chen. 2024. SecuDB: An In-enclave Privacy-preserving and Tamper-resistant Relational Database. https:\/\/www.semanticscholar.org\/paper\/SecuDB%3A-An-In-enclave-Privacy-preserving-and-Yang-Yue\/bf95cb32d222a794a0b2beb29402550e3cb42640?utm_source=alert_email&utm_content=LibraryFolder&utm_campaign=AlertEmails_WEEKLY&utm_term=LibraryFolder&email_index=9-0-15&utm_medium=39105601"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620678.3624658"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCC56315.2022.00019"}],"event":{"name":"SIGMOD\/PODS '25: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Berlin Germany","acronym":"DaMoN '25"},"container-title":["Proceedings of the 21st International Workshop on Data Management on New Hardware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3736227.3736234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T09:17:44Z","timestamp":1752571064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3736227.3736234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":35,"alternative-id":["10.1145\/3736227.3736234","10.1145\/3736227"],"URL":"https:\/\/doi.org\/10.1145\/3736227.3736234","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]},"assertion":[{"value":"2025-07-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}