{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T12:58:56Z","timestamp":1761569936970,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755920","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"233-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DPCapsule: A Decentralized Private Computing System With Self-Controlled Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0483-913X","authenticated-orcid":false,"given":"Yitong","family":"Cheng","sequence":"first","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5904-5115","authenticated-orcid":false,"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai JiaoTong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2211-9120","authenticated-orcid":false,"given":"Zhichao","family":"Hua","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. Ethereum gas and fees: technical overview. https:\/\/ethereum.org\/en\/developers\/docs\/gas\/. Accessed: 2025-05-08."},{"key":"e_1_3_3_1_3_2","unstructured":"Apr 2024. Arm Confidential Compute Architecture. https:\/\/www.arm.com\/architecture\/security-features\/arm-confidential-compute-architecture."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Abbas Acar Hidayet Aksu A\u00a0Selcuk Uluagac and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur) 51 4 (2018) 1\u201335.","DOI":"10.1145\/3214303"},{"key":"e_1_3_3_1_5_2","unstructured":"Inc. Advanced Micro\u00a0Devices. Apr 2024. AMD Secure Encrypted Virtualization (SEV). https:\/\/www.amd.com\/en\/developer\/sev.html."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Roberto Baldoni Emilio Coppa Daniele\u00a0Cono D\u2019elia Camil Demetrescu and Irene Finocchi. 2018. A survey of symbolic execution techniques. ACM Computing Surveys (CSUR) 51 3 (2018) 1\u201339.","DOI":"10.1145\/3182657"},{"key":"e_1_3_3_1_7_2","unstructured":"Juan Benet. 2014. Ipfs-content addressed versioned p2p file system. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1407.3561 (2014)."},{"key":"e_1_3_3_1_8_2","unstructured":"Daniel\u00a0J Bernstein. 2005. Cache-timing attacks on AES. (2005)."},{"key":"e_1_3_3_1_9_2","unstructured":"Georgy\u00a0Kucherin Boris\u00a0Larin Leonid\u00a0Bezvershenko. 2023. Operation Triangulation: The last (hardware) mystery. https:\/\/securelist.com\/operation-triangulation-the-last-hardware-mystery\/111669\/. Accessed: 2024-11-04."},{"key":"e_1_3_3_1_10_2","volume-title":"11th USENIX workshop on offensive technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure:{ SGX} cache attacks are practical. In 11th USENIX workshop on offensive technologies (WOOT 17)."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCC53141.2021.00016"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Raymond Cheng Fan Zhang Jernej Kos Warren He Nicholas Hynes Noah\u00a0M. Johnson Noah\u00a0R Johnson Ari Juels Andrew Miller and Dawn Song. 2019. Ekiden: A Platform for Confidentiality-Preserving Trustworthy and Performant Smart Contracts. European Symposium on Security and Privacy (2019). 10.1109\/eurosp.2019.00023","DOI":"10.1109\/eurosp.2019.00023"},{"key":"e_1_3_3_1_13_2","unstructured":"SQLite Consortium. Apr 2024. SQLite. https:\/\/www.sqlite.org\/."},{"key":"e_1_3_3_1_14_2","first-page":"4051","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Constable Scott","year":"2023","unstructured":"Scott Constable, Jo Van\u00a0Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, and Mark Silberstein. 2023. { AEX-Notify} : Thwarting Precise { Single-Stepping} Attacks through Interrupt Awareness for Intel { SGX} Enclaves. In 32nd USENIX Security Symposium (USENIX Security 23). 4051\u20134068."},{"key":"e_1_3_3_1_15_2","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_3_1_16_2","first-page":"801","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Das Poulami","year":"2019","unstructured":"Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. { FastKitten} : Practical smart contracts on bitcoin. In 28th USENIX Security Symposium (USENIX Security 19). 801\u2013818."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Ed Dawson and Diane Donovan. 1994. The breadth of Shamir\u2019s secret-sharing scheme. Computers & Security 13 1 (1994) 69\u201378.","DOI":"10.1016\/0167-4048(94)90097-3"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_3_1_19_2","unstructured":"Ronen Eldan and Yuanzhi Li. 2023. TinyStories: How Small Can Language Models Be and Still Speak Coherent English. arxiv:https:\/\/arXiv.org\/abs\/2305.07759\u00a0[cs.CL]"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589050"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Uriel Feige Dror Lapidot and Adi Shamir. 1999. Multiple noninteractive zero knowledge proofs under general assumptions. SIAM Journal on computing 29 1 (1999) 1\u201328.","DOI":"10.1137\/S0097539792230010"},{"key":"e_1_3_3_1_22_2","first-page":"275","volume-title":"15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21)","author":"Feng Erhu","year":"2021","unstructured":"Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable memory protection in the { PENGLAI} enclave. In 15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21). 275\u2013294."},{"key":"e_1_3_3_1_23_2","unstructured":"Fortinet. 2025. SolarWinds Supply Chain Attack. https:\/\/www.fortinet.com\/resources\/cyberglossary\/solarwinds-cyber-attack. Accessed: 2025-04-18."},{"key":"e_1_3_3_1_24_2","unstructured":"Ethereum Foundation. Apr 2024. Ethereum. https:\/\/ethereum.org\/."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485919"},{"key":"e_1_3_3_1_26_2","unstructured":"The go-ethereum Authors. Jan 2024. go-ethereum Official Go implementation of the Ethereum protocol. https:\/\/geth.ethereum.org\/."},{"key":"e_1_3_3_1_27_2","unstructured":"Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version 78 110 (1998) 1\u2013108."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.37"},{"key":"e_1_3_3_1_29_2","first-page":"609","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. { EPK} : Scalable and Efficient Memory Protection Keys. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 609\u2013624."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Jinyu Gu Xinyue Wu Bojun Zhu Yubin Xia Binyu Zang Haibing Guan and Haibo Chen. 2021. Enclavisor: A Hardware-Software Co-Design for Enclaves on Untrusted Cloud. IEEE Trans. Comput. 70 10 (2021) 1598\u20131611. 10.1109\/TC.2020.3019704","DOI":"10.1109\/TC.2020.3019704"},{"key":"e_1_3_3_1_31_2","unstructured":"hananbeer. Apr 2024. Sqlidity. https:\/\/github.com\/hananbeer\/sqlidity."},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Vincent\u00a0C Hu D\u00a0Richard Kuhn David\u00a0F Ferraiolo and Jeffrey Voas. 2015. Attribute-based access control. Computer 48 2 (2015) 85\u201388.","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_3_1_34_2","first-page":"255","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Hua Zhichao","year":"2018","unstructured":"Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang. 2018. { EPTI} : Efficient Defence against Meltdown Attack for Unpatched { VMs}. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 255\u2013266."},{"key":"e_1_3_3_1_35_2","first-page":"541","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Hua Zhichao","year":"2017","unstructured":"Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. { vTZ} : Virtualizing { ARM}{ TrustZone}. In 26th USENIX Security Symposium (USENIX Security 17). 541\u2013556."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Zhichao Hua Yang Yu Jinyu Gu Yubin Xia Haibo Chen and Binyu Zang. 2021. TZ-container: Protecting container from untrusted OS with ARM TrustZone. Science China Information Sciences 64 9 (2021) 192101.","DOI":"10.1007\/s11432-019-2707-6"},{"key":"e_1_3_3_1_37_2","unstructured":"Yahoo Inc.Jan 2024. YCSB: Yahoo! Cloud Serving Benchmark. https:\/\/github.com\/brianfrankcooper\/YCSB"},{"key":"e_1_3_3_1_38_2","unstructured":"Intel. 2023. Intel Trust Domain Extensions (Intel TDX). https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/690419."},{"key":"e_1_3_3_1_39_2","first-page":"437","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Jia Yuekai","year":"2022","unstructured":"Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, and Zhengyu He. 2022. HyperEnclave: An Open and Cross-platform Trusted Execution Environment. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 437\u2013454."},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_3_1_41_2","unstructured":"Brian Knott Shobha Venkataraman Awni Hannun Shubho Sengupta Mark Ibrahim and Laurens van\u00a0der Maaten. 2021. Crypten: Secure multi-party computation meets machine learning. Advances in Neural Information Processing Systems 34 (2021) 4961\u20134973."},{"key":"e_1_3_3_1_42_2","unstructured":"Mikhail\u00a0V Koroteev. 2021. BERT: a review of applications in natural language processing and understanding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2103.11943 (2021)."},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Kamran Kowsari Kiana Jafari\u00a0Meimandi Mojtaba Heidarysafa Sanjana Mendu Laura Barnes and Donald Brown. 2019. Text Classification Algorithms: A Survey. Information 10 4 (2019). 10.3390\/info10040150","DOI":"10.3390\/info10040150"},{"key":"e_1_3_3_1_44_2","unstructured":"Alex Krizhevsky Geoffrey Hinton et\u00a0al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Satish Kumar Dipasha Sharma Sandeep Rao Weng\u00a0Marc Lim and Sachin\u00a0Kumar Mangla. 2022. Past present and future of sustainable finance: insights from big data analytics through machine learning of scholarly research. Annals of Operations Research (2022) 1\u201344.","DOI":"10.1007\/s10479-022-04535-4"},{"key":"e_1_3_3_1_46_2","unstructured":"Patrick Lewis Ethan Perez Aleksandra Piktus Fabio Petroni Vladimir Karpukhin Naman Goyal Heinrich K\u00fcttler Mike Lewis Wen-tau Yih Tim Rockt\u00e4schel et\u00a0al. 2020. Retrieval-augmented generation for knowledge-intensive nlp tasks. Advances in neural information processing systems 33 (2020) 9459\u20139474."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833768"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","unstructured":"Joshua Lind Oded Naor Ittay Eyal Florian Kelbert Emin\u00a0G\u00fcn Sirer and Peter Pietzuch. 2019. Teechain: a secure payment network with asynchronous blockchain access. Symposium on Operating Systems Principles (2019). 10.1145\/3341301.3359627","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_3_1_50_2","unstructured":"Redis Ltd. Aug 2024. Redis is an in-memory database that persists on disk. https:\/\/github.com\/redis\/redis."},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2018.00030"},{"key":"e_1_3_3_1_52_2","first-page":"17","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Ma Junming","year":"2023","unstructured":"Junming Ma, Yancheng Zheng, Jun Feng, Derun Zhao, Haoqi Wu, Wenjing Fang, Jin Tan, Chaofan Yu, Benyu Zhang, and Lei Wang. 2023. { SecretFlow-SPU} : A Performant and { User-Friendly} Framework for { Privacy-Preserving} Machine Learning. In 2023 USENIX Annual Technical Conference (USENIX ATC 23). 17\u201333."},{"key":"e_1_3_3_1_53_2","first-page":"155","volume-title":"https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/mai17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Mai HaoHui","year":"2023","unstructured":"HaoHui Mai, Jiacheng Zhao, Hongren Zheng, Yiyang Zhao, Zibin Liu, Mingyu Gao, Cong Wang, Huimin Cui, Xiaobing Feng, and Christos Kozyrakis. 2023. Honeycomb: Secure and Efficient GPU Executions via Static Validation. https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/mai. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). USENIX Association, Boston, MA, 155\u2013172."},{"key":"e_1_3_3_1_54_2","unstructured":"meta-llama. 2024. GitHub - meta-llama\/llama: Inference code for Llama models. https:\/\/github.com\/meta-llama\/llama."},{"key":"e_1_3_3_1_55_2","unstructured":"Lakshmi Npathi. 2023. IMDB Dataset of 50K Movie Reviews. https:\/\/www.kaggle.com\/datasets\/lakshmi25npathi\/imdb-dataset-of-50k-movie-reviews"},{"key":"e_1_3_3_1_56_2","unstructured":"Nvidia. 2024. NVIDIA H100 Tensor Core GPU. https:\/\/www.nvidia.com\/en-us\/data-center\/h100\/."},{"key":"e_1_3_3_1_57_2","unstructured":"OpenAI. 2025. Function Calling. https:\/\/platform.openai.com\/docs\/guides\/function-calling. Accessed: 2025-04-01."},{"key":"e_1_3_3_1_58_2","unstructured":"Arm\u00a0Limited (or\u00a0its affiliates). Apr 2024. Learn the architecture - TrustZone for AArch64. https:\/\/developer.arm.com\/documentation\/102418\/latest\/."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"e_1_3_3_1_60_2","unstructured":"Security Enhanced Linux\u00a0(SELinux) project. Apr 2024. SELinux Project Wiki. https:\/\/selinuxproject.org\/page\/Main_Page."},{"key":"e_1_3_3_1_61_2","unstructured":"PyTorch Foundation. 2024. PyTorch Vision Models. https:\/\/pytorch.org\/vision\/stable\/models.html."},{"key":"e_1_3_3_1_62_2","unstructured":"Qualys. [n. d.]. regreSSHion: RCE in OpenSSH\u2019s server on glibc-based Linux systems (CVE-2024-6387). https:\/\/www.qualys.com\/2024\/07\/01\/cve-2024-6387\/regresshion.txt. Accessed: 2024-11-04."},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"crossref","unstructured":"Cezar Reinbrecht Altamiro Susin Lilian Bossuet Georg Sigl and Johanna Sep\u00falveda. 2017. Timing attack on NoC-based systems: Prime+ Probe attack and NoC-based protection. Microprocessors and Microsystems 52 (2017) 556\u2013565.","DOI":"10.1016\/j.micpro.2016.12.010"},{"key":"e_1_3_3_1_64_2","first-page":"237","volume-title":"Advances in computers","author":"Sandhu Ravi\u00a0S","year":"1998","unstructured":"Ravi\u00a0S Sandhu. 1998. Role-based access control. In Advances in computers. Vol.\u00a046. Elsevier, 237\u2013286."},{"key":"e_1_3_3_1_65_2","unstructured":"Manish Sanwal. 2025. Layered Chain-of-Thought Prompting for Multi-Agent LLM Systems: A Comprehensive Approach to Explainable Large Language Models. arxiv:https:\/\/arXiv.org\/abs\/2501.18645\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2501.18645"},{"key":"e_1_3_3_1_66_2","unstructured":"Maximilian Schreiner. Mar 2024. GPT-4 architecture datasets costs and more leaked. https:\/\/the-decoder.com\/gpt-4-architecture-datasets-costs-and-more-leaked\/."},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","unstructured":"Muhammad Shayan Clement Fung Clement Fung Chris J.\u00a0M. Yoon and Ivan Beschastnikh. 2020. Biscotti: A Blockchain System for Private and Secure Federated Learning. IEEE Transactions on Parallel and Distributed Systems (2020). 10.1109\/tpds.2020.3044223","DOI":"10.1109\/tpds.2020.3044223"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_3_1_69_2","unstructured":"David Slate. 1991. Letter Recognition. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C5ZP40."},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","unstructured":"Samuel Steffen Benjamin Bichsel Roger Baumgartner and Martin Vechev. 2022. ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs. IEEE Symposium on Security and Privacy (2022). 10.1109\/sp46214.2022.9833732","DOI":"10.1109\/sp46214.2022.9833732"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363222"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"crossref","unstructured":"Volker Tresp J\u00a0Marc Overhage Markus Bundschus Shahrooz Rabizadeh Peter\u00a0A Fasching and Shipeng Yu. 2016. Going digital: a survey on digitalization and large-scale data analytics in healthcare. Proc. IEEE 104 11 (2016) 2180\u20132206.","DOI":"10.1109\/JPROC.2016.2615052"},{"key":"e_1_3_3_1_73_2","first-page":"645","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald\u00a0E Porter, and Mona Vij. 2017. { Graphene-SGX} : A practical library { OS} for unmodified applications on { SGX}. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 645\u2013658."},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_3_1_75_2","unstructured":"Tom\u00a0Van Vleck. Apr 2024. Multics (Multiplexed Information and Computing Service). https:\/\/www.multicians.org\/."},{"key":"e_1_3_3_1_76_2","first-page":"681","volume-title":"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/volos13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/volos. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 681\u2013696."},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","unstructured":"Jishu Wang Yaowei Wang Xuan Zhang Zhi Jin Chao Zhu Linyu Li Rui Zhu and Shenglong Lv. 2023. LearningChain: A Highly Scalable and Applicable Learning-Based Blockchain Performance Optimization Framework. IEEE Transactions on Network and Service Management (2023). 10.1109\/tnsm.2023.3347789","DOI":"10.1109\/tnsm.2023.3347789"},{"key":"e_1_3_3_1_78_2","unstructured":"Wikipedia. [n. d.]. XZ Utils backdoor. https:\/\/en.wikipedia.org\/wiki\/XZ_Utils_backdoor. Accessed: 2024-11-04."},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","unstructured":"Pengfei Wu Pengfei Wu Jianting Ning Jianting Ning Shen Jia-heng Jiamin Shen Hongbing Wang Hongbing Wang Ee-Chien Chang and Ee-Chien Chang. 2022. Hybrid Trust Multi-party Computation with Trusted Execution Environment. Network and Distributed System Security Symposium (2022). 10.14722\/ndss.2022.24173","DOI":"10.14722\/ndss.2022.24173"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Yubin Xia Zhichao Hua Yang Yu Jinyu Gu Haibo Chen Binyu Zang and Haibing Guan. 2021. Colony: A privileged trusted execution environment with extensibility. IEEE Trans. Comput. 71 2 (2021) 479\u2013492.","DOI":"10.1109\/TC.2021.3055293"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3698038.3698510"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"crossref","unstructured":"Chen Zhang Yu Xie Hang Bai Bin Yu Weihong Li and Yuan Gao. 2021. A survey on federated learning. Knowledge-Based Systems 216 (2021) 106775.","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"],"location":"Trondheim Norway","acronym":"Internetware 2025"},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:47:05Z","timestamp":1761565625000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":82,"alternative-id":["10.1145\/3755881.3755920","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755920","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}