{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T14:19:17Z","timestamp":1765721957990,"version":"3.48.0"},"reference-count":284,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,22]]},"abstract":"<jats:p>Cloud services have revolutionized modern computing. The benefits of outsourcing data and computation come with security and privacy concerns. This monograph explores the advances in cloud security research across both industry and academia, with a special focus on secure infrastructure, services and storage. Besides overviewing the state of the art, the monograph highlights open problems, and possible future research directions.<\/jats:p>","DOI":"10.1561\/3300000028","type":"journal-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T05:40:18Z","timestamp":1645508418000},"page":"103-213","source":"Crossref","is-referenced-by-count":5,"title":["Cloud Computing Security: Foundations and Research Directions"],"prefix":"10.1561","volume":"3","author":[{"given":"Anrin","family":"Chakraborti","sequence":"first","affiliation":[{"name":"Duke University","place":["USA"]}]},{"given":"Reza","family":"Curtmola","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology","place":["USA"]}]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[{"name":"University of Maryland","place":["USA"]}]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[{"name":"Columbia University","place":["USA"]}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische University Darmstadt","place":["Germany"]}]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[{"name":"Stony Brook University","place":["USA"]}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology","place":["China"]}]}],"member":"140","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"2025121409152109300_ref001","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1314466.1314469","article-title":"Yet another microarchitectural attack: exploiting I-cache","volume-title":"Proceedings of the 2007 ACM workshop on Computer security architecture.","author":"Acii\u00e7mez","year":"2007"},{"key":"2025121409152109300_ref002","doi-asserted-by":"crossref","DOI":"10.1007\/11935308_9","article-title":"Trace-driven cache attacks on AES","volume-title":"Proceedings of the 8th International Conference on Information and Communications Security (ICICS \u201806).","author":"Acii\u00e7mez","year":"2006"},{"key":"2025121409152109300_ref003","first-page":"139","article-title":"Improving Brumley and Boneh timing attack on unprotected SSL implementations","volume-title":"Proceedings of the 12th ACM conference on Computer and communications security (CCS 05).","author":"Acii\u00e7mez","year":"2005"},{"key":"2025121409152109300_ref004","first-page":"271","volume-title":"Cryptographers\u2019 track at the RSA conference.","author":"Acii\u00e7mez","year":"2007"},{"key":"2025121409152109300_ref005","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23284","article-title":"OBLIVIATE: A Data Oblivious Filesystem for Intel SGX","volume-title":"Proceedings of the 2018 ISOC Network and Distributed System Security Symposium (NDSS 18).","author":"Ahmad","year":"2018"},{"key":"2025121409152109300_ref006","first-page":"870","article-title":"Port contention for fun and profit","volume-title":"Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 19).","author":"Aldaya","year":"2019"},{"key":"2025121409152109300_ref007","unstructured":"AMD.\n           (2020). \u201cAMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More\u201d. URL: https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf."},{"key":"2025121409152109300_ref008","unstructured":"AMD.\n           (2021). \u201cAMD Secure Encryption Virtualization (SEV) Information Disclosure, AMD-SB-1013\u201d. URL: https:\/\/www.amd.com\/en\/corporate\/product-security\/bulletin\/amd-sb-1013."},{"key":"2025121409152109300_ref009","unstructured":"Anandtech.\n           (2021). \u201cArm Announces Neoverse V1, N2 Platforms & CPUs, CMN-700 Mesh: More Performance, More Cores, More Flexibility\u201d. URL: https:\/\/www.anandtech.com\/show\/16640\/ rm-announces-neoverse-v1-n2-platforms-cpus-cmn700-mesh."},{"key":"2025121409152109300_ref010","first-page":"1051","article-title":"Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 16).","author":"Armknecht","year":"2016"},{"issue":"1","key":"2025121409152109300_ref011","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TCC.2018.2865554","article-title":"Outsourcing Proofs of Retrievability","volume":"9","author":"Armknecht","year":"2021","journal-title":"IEEE Transactions on Cloud Computing."},{"volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16).","year":"2016","author":"Arnautov","key":"2025121409152109300_ref012"},{"key":"2025121409152109300_ref013","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-17656-3_8","article-title":"Locality-Preserving Oblivious RAM","author":"Asharov","year":"2019","journal-title":"Advances in Cryptology - EUROCRYPT 2019."},{"key":"2025121409152109300_ref014","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-45724-2_14","article-title":"OptORAMa: Optimal Oblivious RAM","volume-title":"Advances in Cryptology - EUROCRYPT 2020.","author":"Asharov","year":"2020"},{"issue":"1","key":"2025121409152109300_ref015","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1952982.1952994","article-title":"Remote data checking using provable data possession","volume":"14","author":"Ateniese","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2025121409152109300_ref016","first-page":"598","article-title":"Provable data possession at untrusted stores","volume-title":"Proceedings of the 14th ACM SIGSAC Conference on Computer and Communication Security (CCS 07).","author":"Ateniese","year":"2007"},{"key":"2025121409152109300_ref017","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24427","article-title":"Proof of Storage-Time: Efficiently Checking Continuous Data Availability","volume-title":"Proceedings of the 27th ISOC Network and Distributed System Security Symposium (NDSS 20).","author":"Ateniese","year":"2020"},{"issue":"2","key":"2025121409152109300_ref018","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s00145-009-9040-7","article-title":"Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries","volume":"23","author":"Aumann","year":"2010","journal-title":"J. Cryptology."},{"key":"2025121409152109300_ref019","doi-asserted-by":"crossref","unstructured":"Aviv, A. J., S. G.Choi, T.Mayberry, and D. S.Roche. (2017). \u201cOblivi-Sync: Practical Oblivious File Backup and Synchronization\u201d. In: Proceedings of the 24th ISOC Network and Distributed System Security Symposium (NDSS 17). \u201cAWS CloudHSM\u201d. url: https:\/\/aws.amazon.com\/cloudhsm\/.","DOI":"10.14722\/ndss.2017.23188"},{"key":"2025121409152109300_ref020","article-title":"CURE: A Security Architecture with Customizable and Resilient Enclaves","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21).","author":"Bahmani","year":"2021"},{"key":"2025121409152109300_ref021","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003).","author":"Barham","year":"2003"},{"key":"2025121409152109300_ref022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2381913.2381915","article-title":"Detecting co-residency with active traffic analysis techniques","volume-title":"Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (CCSW 12).","author":"Bates","year":"2012"},{"key":"2025121409152109300_ref023","first-page":"267","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI 2014).","author":"Baumann","year":"2014"},{"key":"2025121409152109300_ref024","article-title":"Shielding Applications from an Untrusted Cloud with Haven","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI14).","author":"Baumann","year":"2014"},{"key":"2025121409152109300_ref025","first-page":"560","volume-title":"Advances in Cryptology\u2014Crypto \u201889.","author":"Beaver","year":"1989"},{"key":"2025121409152109300_ref026","first-page":"589","volume-title":"Advances in Cryptology\u2014Crypto \u201889.","author":"Beaver","year":"1989"},{"key":"2025121409152109300_ref027","first-page":"1","article-title":"Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)","volume-title":"Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC).","author":"Ben-Or","year":"1988"},{"key":"2025121409152109300_ref028","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/2046660.2046677","volume-title":"Proceedings of the 3rd ACM Cloud Computing Security Workshop (CCSW 11).","author":"Benson","year":"2011"},{"key":"2025121409152109300_ref029","unstructured":"Bernstein, D. J.\n           (2005). \u201cCache-timing attacks on AES\u201d. URL: https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf."},{"key":"2025121409152109300_ref030","first-page":"785","article-title":"SMoTherSpectre: exploiting speculative execution through port contention","volume-title":"Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS 19).","author":"Bhattacharyya","year":"2019"},{"key":"2025121409152109300_ref031","doi-asserted-by":"crossref","DOI":"10.1145\/2810103.2813649","article-title":"Practicing Oblivious Access on Cloud Storage: The Gap, the Fallacy, and the New Way Forward","volume-title":"Poceedings of the 2015 ACM SIGSAC Conference on Computer and Communication Security (CCS 15).","author":"Bindschaedler","year":"2015"},{"key":"2025121409152109300_ref032","doi-asserted-by":"crossref","DOI":"10.1145\/2660267.2660313","article-title":"Toward Robust Hidden Volumes Using Write-Only Oblivious RAM","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 14).","author":"Blass","year":"2014"},{"key":"2025121409152109300_ref033","first-page":"192","volume-title":"Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS).","author":"Bogdanov","year":"2008"},{"key":"2025121409152109300_ref034","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","author":"Boneh","year":"2004","journal-title":"Proceedings of Eurocrypt 2004."},{"key":"2025121409152109300_ref035","first-page":"201","volume-title":"Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems.","author":"Bonneau","year":"2006"},{"key":"2025121409152109300_ref036","doi-asserted-by":"crossref","DOI":"10.1145\/1653662.1653686","article-title":"HAIL: a high-availability and integrity layer for cloud storage","volume-title":"Proceedings of 2009 ACM SIGSAC Conference on Computer and Communication Security (CCS 09).","author":"Bowers","year":"2009"},{"key":"2025121409152109300_ref037","first-page":"501","article-title":"How to Tell If Your Cloud Files Are Vulnerable to Drive Crashes","volume-title":"Proceedings of the 18th ACM SIGSAC Conference on Computer and Communications Security (CCS 11).","author":"Bowers","year":"2011"},{"key":"2025121409152109300_ref038","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-49099-0_7","article-title":"Oblivious Parallel RAM and Applications","volume-title":"Theory of Cryptography.","author":"Boyle","year":"2016"},{"key":"2025121409152109300_ref039","article-title":"VoiceGuard: Secure and Private Speech Processing","volume-title":"Interspeech.","author":"Brasser","year":"2018"},{"issue":"5","key":"2025121409152109300_ref040","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","article-title":"Remote timing attacks are practical","volume":"48","author":"Brumley","year":"2005","journal-title":"Computer Networks."},{"year":"2017","author":"Bugnion","key":"2025121409152109300_ref041"},{"key":"2025121409152109300_ref042","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1145\/2382196.2382226","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012).","author":"Butt","year":"2012"},{"key":"2025121409152109300_ref043","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology -CRYPTO 2013.","author":"Cash","year":"2013"},{"key":"2025121409152109300_ref044","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/978-3-642-38348-9_17","volume-title":"Advances in Cryptology -EUROCRYPT 2013.","author":"Cash","year":"2013"},{"key":"2025121409152109300_ref045","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23320","article-title":"rORAM: Efficient Range ORAM with O(log2N) Locality","volume-title":"Proceedings of the 26th ISOC Network and Distributed System Security Symposium (NDSS 19).","author":"Chakraborti","year":"2019"},{"key":"2025121409152109300_ref046","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23411","article-title":"ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM","volume-title":"Proceedings of the 26th ISOC Network and Distributed System Security Symposium (NDSS 19).","author":"Chakraborti","year":"2019"},{"key":"2025121409152109300_ref047","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70694-8_20","article-title":"On the Depth of Oblivious Parallel RAM","volume-title":"Advances in Cryptology - ASI-ACRYPT 2017.","author":"Chan","year":"2017"},{"key":"2025121409152109300_ref048","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70694-8_23","article-title":"Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM","volume-title":"Advances in Cryptology - ASIACRYPT 2017.","author":"Chan","year":"2017"},{"volume-title":"Applied Cryptography and Network Security.","year":"2005","author":"Chang","key":"2025121409152109300_ref049"},{"key":"2025121409152109300_ref050","first-page":"11","article-title":"Multiparty Unconditionally Secure Protocols (Extended Abstract)","volume-title":"Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC).","author":"Chaum","year":"1988"},{"key":"2025121409152109300_ref051","doi-asserted-by":"crossref","DOI":"10.1145\/1866835.1866842","article-title":"Remote Data Checking for Network Coding-based Distributed Storage Systems","volume-title":"Proceedings of the 2010 ACM Cloud Computing Security Workshop (CCSW 10).","author":"Chen","year":"2010"},{"key":"2025121409152109300_ref052","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-662-49099-0_8","volume-title":"Theory of Cryptography.","author":"Chen","year":"2016"},{"key":"2025121409152109300_ref053","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1145\/2435349.2435402","article-title":"Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds","volume-title":"Proceedings of the Third ACM Conference on Data and Application Security and Privacy.","author":"Chen","year":"2013"},{"key":"2025121409152109300_ref054","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2014.23184","article-title":"Auditable Version Control Systems","volume-title":"Proceedings of the 21th ISOC Network and Distributed System Security Symposium (NDSS \u201814).","author":"Chen","year":"2014"},{"issue":"6","key":"2025121409152109300_ref055","doi-asserted-by":"crossref","first-page":"537","DOI":"10.3233\/JCS-16868","article-title":"Remote data integrity checking with server-side repair","volume":"25","author":"Chen","year":"2017","journal-title":"Journal of Computer Security."},{"issue":"4","key":"2025121409152109300_ref056","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TPDS.2020.3030063","article-title":"BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication","volume":"32","author":"Chen","year":"2021","journal-title":"IEEE Transactions on Parallel and Distributed Systems."},{"key":"2025121409152109300_ref057","doi-asserted-by":"crossref","DOI":"10.1109\/DSC47296.2019.8937682","article-title":"Defeating Speculative-Execution Attacks on SGX with HyperRace","volume-title":"Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC 19).","author":"Chen","year":"2019"},{"key":"2025121409152109300_ref058","first-page":"491","article-title":"Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 19).","author":"Chen","year":"2019"},{"key":"2025121409152109300_ref059","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1145\/3196494.3196501","article-title":"Leveraging hardware transactional memory for cache side-channel defenses","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security.","author":"Chen","year":"2018"},{"key":"2025121409152109300_ref060","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/3052973.3053007","article-title":"Detecting privileged side-channel attacks in shielded execution with D\u00e9j\u00e0 Vu","volume-title":"Proceedings ofthe 2017 ACM Asia Conference on Computer and Communications Security (AsiaCCS 17).","author":"Chen","year":"2017"},{"key":"2025121409152109300_ref061","first-page":"2","volume-title":"Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008).","author":"Chen","year":"2008"},{"key":"2025121409152109300_ref062","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/1995896.1995914","volume-title":"Proceedings of the 25th International Conference on Supercomputing (ICS 2011).","author":"Chhabra","year":"2011"},{"key":"2025121409152109300_ref063","first-page":"1162","article-title":"Real time detection of cache-based side-channel attacks using hardware performance counters","volume-title":"Applied Soft Computing.","author":"Chiappetta","year":"2016"},{"issue":"6","key":"2025121409152109300_ref064","doi-asserted-by":"crossref","DOI":"10.1145\/293347.293350","article-title":"Private information retrieval","volume":"45","author":"Chor","year":"1998","journal-title":"Journal of the ACM."},{"key":"2025121409152109300_ref065","first-page":"23","volume-title":"Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2009).","author":"Cohen","year":"2009"},{"key":"2025121409152109300_ref066","first-page":"189","volume-title":"Proceedings of the 23rd A CM Symposium on Operating Systems Principles (SOSP 2011).","author":"Colp","year":"2011"},{"key":"2025121409152109300_ref067","doi-asserted-by":"crossref","DOI":"10.1145\/2908080.2908100","article-title":"End-to-End Verification of Information-Flow Security for C and Assembly Programs","volume-title":"Proceedings ofthe 37th ACM Conference on Programming Language Design and Implementation (PLDI 2016).","author":"Costanzo","year":"2016"},{"key":"2025121409152109300_ref068","unstructured":"\u201cCryptographic Module Validation Program\u201d.\n           URL: https:\/\/csrc.nist.gov\/projects\/cryptographic-module-validation-program."},{"key":"2025121409152109300_ref069","doi-asserted-by":"crossref","DOI":"10.1145\/1456469.1456481","article-title":"Robust Remote Data Checking","volume-title":"Proceedings of the 2008 ACM Workshop on Storage Security and Survivability (StorageSS).","author":"Curtmola","year":"2008"},{"key":"2025121409152109300_ref070","doi-asserted-by":"crossref","DOI":"10.1109\/ICDCS.2008.68","article-title":"MR-PDP: Multiple-Replica Provable Data Possession","volume-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS 08).","author":"Curtmola","year":"2008"},{"key":"2025121409152109300_ref071","doi-asserted-by":"crossref","DOI":"10.1145\/1180405.1180417","article-title":"Searchable symmetric encryption: improved definitions and efficient constructions","volume-title":"CCS \u201806: Proceedings of the 13th ACM conference on Computer and communications security.","author":"Curtmola","year":"2006"},{"key":"2025121409152109300_ref072","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/2541940.2541946","article-title":"KVM\/ARM: The Design and Implementation of the Linux ARM Hypervisor","volume-title":"Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems.","author":"Dall","year":"2014"},{"key":"2025121409152109300_ref073","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-030-26948-7_13","volume-title":"Advances in Cryptology - CRYPTO 2019.","author":"Damg\u00e2rd","year":"2019"},{"key":"2025121409152109300_ref074","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1145\/3052973.3053016","volume-title":"Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (AsiaCCS 17).","author":"Dang","year":"2017"},{"key":"2025121409152109300_ref075","article-title":"Remote integrity checking","volume-title":"Proceedings of Conference on Integrity and Internal Control in Information Systems (IICIS\u201903).","author":"Deswarte","year":"2003"},{"key":"2025121409152109300_ref076","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-49099-0_6","article-title":"Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM","volume-title":"Theory ofCryptography.","author":"Devadas","year":"2016"},{"key":"2025121409152109300_ref077","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-80825-9_14","article-title":"Calibration Done Right: Noiseless Flush+ Flush Attacks","volume-title":"Proceedings of the 18th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2021).","author":"Didier","year":"2021"},{"key":"2025121409152109300_ref078","first-page":"265","article-title":"Hourglass Schemes: How to Prove That Cloud Files Are Encrypted","volume-title":"Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communications Securit (CCS 12).","author":"Dijk","year":"2012"},{"key":"2025121409152109300_ref079","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2007.232","article-title":"Network Coding for Distributed Storage Systems","volume-title":"IN-FOCOM.","author":"Dimakis","year":"2007"},{"key":"2025121409152109300_ref080","doi-asserted-by":"crossref","DOI":"10.1109\/TIT.2010.2054295","article-title":"Network Coding for Distributed Storage Systems","volume-title":"IEEE Transactions on Information Theory.","author":"Dimakis","year":"2010"},{"key":"2025121409152109300_ref081","doi-asserted-by":"crossref","unstructured":"Dwork, C. and A.Roth. (2014). \u201cThe Algorithmic Foundations of Differential Privacy\u201d. Foundations and Trends\u00ae in Theoretical Computer Science.9(3\u20134): 211\u2013407. url: http:\/\/dx.doi.org\/10.1561\/0400000042.","DOI":"10.1561\/0400000042"},{"key":"2025121409152109300_ref082","unstructured":"\u201cENFORCER Server\u201d.\n           url: https:\/\/enforcerserver.com\/."},{"key":"2025121409152109300_ref083","doi-asserted-by":"crossref","DOI":"10.1145\/1653662.1653688","article-title":"Dynamic Provable Data Possession","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS 09).","author":"Erway","year":"2009"},{"issue":"4","key":"2025121409152109300_ref084","doi-asserted-by":"crossref","DOI":"10.1145\/2699909","article-title":"Dynamic Provable Data Possession","volume":"17","author":"Erway","year":"2015","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"2025121409152109300_ref085","doi-asserted-by":"crossref","DOI":"10.14778\/3364324.3364331","article-title":"ObliDB: Oblivious Query Processing for Secure Databases","volume":"13","author":"Eskandarian","year":"2019","journal-title":"Proc. VLDB Endow."},{"key":"2025121409152109300_ref086","first-page":"1","volume-title":"Applied Cryptography and Network Security.","author":"Etemad","year":"2013"},{"issue":"1","key":"2025121409152109300_ref087","doi-asserted-by":"crossref","DOI":"10.1145\/3365998","article-title":"Generic Dynamic Data Outsourcing Framework for Integrity Verification","volume":"53","author":"Etemad","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"2025121409152109300_ref088","doi-asserted-by":"crossref","unstructured":"Evans, D., V.Kolesnikov, and M.Rosulek. (2018). \u201cA Pragmatic Introduction to Secure Multi-Party Computation\u201d. Foundations and Trends\u00ae in Privacy and Security.2(2\u20133): 70-246. url: http:\/\/dx.doi.org\/10.1561\/3300000019.","DOI":"10.1561\/3300000019"},{"volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS 20).","year":"2020","author":"Falzon","key":"2025121409152109300_ref089"},{"key":"2025121409152109300_ref090","article-title":"Demonstrating data possession and uncheatable data transfer","volume-title":"IACR ePrint archive","author":"Filho","year":"2006"},{"key":"2025121409152109300_ref091","unstructured":"\u201cFIPS\n          \n          140\u20132\u201d. url: https:\/\/en.wikipedia.org\/wiki\/FIPS_140\u20132."},{"key":"2025121409152109300_ref092","unstructured":"\u201cFIPS\n          \n          140\u20133\u201d. url: https:\/\/en.wikipedia.org\/wiki\/FIPS_140\u20133."},{"key":"2025121409152109300_ref093","article-title":"Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM","author":"Fletcher","year":"2015","journal-title":"Cryptology ePrint Archive, Report 2015\/1065"},{"key":"2025121409152109300_ref094","unstructured":"\u201cFrequently Asked Questions on seL4\u201d.\n           url: https:\/\/docs.sel4.systems\/projects\/sel4\/frequently-asked-questions.html."},{"key":"2025121409152109300_ref095","doi-asserted-by":"crossref","first-page":"172\u2013","DOI":"10.1109\/SP.2017.10","article-title":"SoK: Cryptographically Protected Database Search","volume-title":"Proceedings of the 2017 IEEE Symposium on Security and Privacy (S&P 17).","author":"Fuller","year":"2017"},{"key":"2025121409152109300_ref096","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP 2003).","author":"Garfinkel","year":"2003"},{"volume-title":"Advances in Cryptology - CRYPTO 2016.","year":"2016","author":"Garg","key":"2025121409152109300_ref097"},{"key":"2025121409152109300_ref098","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39077-7_1","article-title":"Optimizing ORAM and Using It Efficiently for Secure Computation","volume-title":"Proceedings ofthe 13th Privacy Enhancing Technologies Symposium (PETS 13).","author":"Gentry","year":"2013"},{"issue":"4","key":"2025121409152109300_ref099","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TCC.2014.2358236","article-title":"Preventing cache-based side-channel attacks in a cloud environment","volume":"2","author":"Godfrey","year":"2014","journal-title":"IEEE transactions on cloud computing."},{"key":"2025121409152109300_ref100","article-title":"Secure Indexes","volume-title":"Cryptology ePrint Archive, Report 2003\/216","author":"Goh","year":"2003"},{"year":"2004","author":"Goldreich","key":"2025121409152109300_ref101"},{"key":"2025121409152109300_ref102","first-page":"218","article-title":"How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority","volume-title":"Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC).","author":"Goldreich","year":"1987"},{"key":"2025121409152109300_ref103","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","article-title":"Software Protection and Simulation on Oblivious RAMs","volume":"43","author":"Goldreich","year":"1996","journal-title":"Journal of the ACM."},{"key":"2025121409152109300_ref104","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/0-387-34799-2","volume-title":"Advances in Cryptology\u2014Crypto \u201890.","author":"Goldwasser","year":"1990"},{"key":"2025121409152109300_ref105","first-page":"120","article-title":"Cryptographic Primitives Enforcing Communication and Storage Complexity","volume-title":"Proceedings of the Internation Conference on Financial Cryptography and Data Security (FC 02).","author":"Golle","year":"2002"},{"key":"2025121409152109300_ref106","first-page":"31","volume-title":"Proceedings of ACNS.","author":"Golle","year":"2004"},{"key":"2025121409152109300_ref107","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2435349.2435353","volume-title":"Proceedings of the Third ACM Conference on Data and Application Security and Privacy.","author":"Gondree","year":"2013"},{"key":"2025121409152109300_ref108","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22012-8_46","article-title":"Privacy-preserving Access of Outsourced Data via Oblivious RAM Simulation","volume-title":"Proceedings of the 38th International Conference on Automata, Languages and Programming (ICALP 11).","author":"Goodrich","year":"2011"},{"key":"2025121409152109300_ref109","first-page":"95","article-title":"Oblivious RAM Simulation with Efficient Worst-case Access Overhead","volume-title":"Proceedings of the 2011 ACM Cloud Computing Security Workshop (CCSW 11).","author":"Goodrich","year":"2011"},{"key":"2025121409152109300_ref110","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-12691-3_19","article-title":"Data-Oblivious Graph Algorithms in Outsourced External Memory","volume-title":"Combinatorial Optimization and Applications.","author":"Goodrich","year":"2014"},{"key":"2025121409152109300_ref111","unstructured":"\u201cGoogle Cloud Key Management\u201d.\n           url: https:\/\/cloud.google.com\/security-key-management."},{"key":"2025121409152109300_ref112","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-3-030-84245-1_10","volume-title":"Advances in Cryptology\u2014Crypto 2021, Part II.","author":"Goyal","year":"2021"},{"key":"2025121409152109300_ref113","first-page":"955","article-title":"Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security 18).","author":"Gras","year":"2018"},{"key":"2025121409152109300_ref114","doi-asserted-by":"crossref","DOI":"10.1145\/3243734.3243864","article-title":"Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.","author":"Grubbs","year":"2018"},{"key":"2025121409152109300_ref115","doi-asserted-by":"crossref","DOI":"10.1145\/3102980.3103007","article-title":"Why Your Encrypted Database Is Not Secure","volume-title":"Proceedings of the 16th Workshop on Hot Topics in Operating Systems.","author":"Grubbs","year":"2017"},{"key":"2025121409152109300_ref116","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security 17).","author":"Gruss","year":"2017"},{"key":"2025121409152109300_ref117","first-page":"279","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 16).","author":"Gruss","year":"2016"},{"issue":"10","key":"2025121409152109300_ref118","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/3356903","article-title":"Building Certified Concurrent OS Kernels","volume":"62","author":"Gu","year":"2019","journal-title":"Communications of the ACM."},{"key":"2025121409152109300_ref119","first-page":"653","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016).","author":"Gu","year":"2016"},{"key":"2025121409152109300_ref120","first-page":"490","volume-title":"Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P 11).","author":"Gullasch","year":"2011"},{"issue":"5","key":"2025121409152109300_ref121","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","article-title":"Lest we remember: cold-boot attacks on encryption keys","volume":"52","author":"Halderman","year":"2009","journal-title":"Communications of the ACM."},{"key":"2025121409152109300_ref122","unstructured":"\u201cHardware Security Module (HSM)\u201d.\n           url: https:\/\/en.wikipedia.org\/wiki\/Hardware%5C_security%5C_module."},{"key":"2025121409152109300_ref123","first-page":"1220","volume-title":"Proceedings ofthe IEEE Symposium on Security and Privacy (S&P 19).","author":"Hastings","year":"2019"},{"year":"2010","author":"Hazay","key":"2025121409152109300_ref124"},{"key":"2025121409152109300_ref125","first-page":"195","volume-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020).","author":"He","year":"2020"},{"key":"2025121409152109300_ref126","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1851276.1851282","volume-title":"Proceedings of the 1st ACM Asia-pacific Workshop on Workshop on Systems (APSys 2010).","author":"Heiser","year":"2010"},{"issue":"7","key":"2025121409152109300_ref127","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/3140607.3050763","article-title":"Security analysis of encrypted virtual machines","volume":"52","author":"Hetzelt","year":"2017","journal-title":"ACM SIGPLAN Notices."},{"key":"2025121409152109300_ref128","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24313","article-title":"MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework","volume-title":"Proeccedings of the 27th ISOC Network and Distributed System Security Symposium (NDSS 20).","author":"Hoang","year":"2020"},{"key":"2025121409152109300_ref129","first-page":"491","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 17).","author":"Hoang","year":"2017"},{"key":"2025121409152109300_ref130","first-page":"172","article-title":"Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset","volume-title":"Proceedings on Privacy Enhancing Technologies (PETS 18).","author":"Hoang","year":"2018"},{"key":"2025121409152109300_ref131","first-page":"265","volume-title":"Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2013).","author":"Hofmann","year":"2013"},{"key":"2025121409152109300_ref132","first-page":"541","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security 2017).","author":"Hua","year":"2017"},{"key":"2025121409152109300_ref133","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/SP.2012.43","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy 2012 (S&P 12).","author":"Huang","year":"2012"},{"key":"2025121409152109300_ref134","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70503-3_3","article-title":"Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs","volume-title":"Theory ofCryptography.","author":"Hubert","year":"2017"},{"key":"2025121409152109300_ref135","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-662-53140-2_18","volume-title":"Proceedings of the 2016 International Conference on Cryptographic Hardware and Embedded Systems.","author":"Inci","year":"2016"},{"key":"2025121409152109300_ref136","unstructured":"Intel.\n           (2014). \u201cIntel Software Guard Extensions Programming Reference\u201d. url: https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298\u2013002.pdf."},{"key":"2025121409152109300_ref137","unstructured":"Intel.\n           (2017). \u201cOverview of Intel Protected File System Library Using Software Guard Extensions\u201d. url: https:\/\/software.intel.com\/en-us\/articles\/overview-of-intel-protected-file-system-library-using-software-guard-extensions."},{"key":"2025121409152109300_ref138","unstructured":"Intel.\n           (2021). \u201cIntel Trust Domain CPU Architectural Extensions\u201d. url: https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/ documents-tps\/intel-tdx-cpu-architectural-specification.pdf."},{"key":"2025121409152109300_ref139","unstructured":"Intel Corporation.\n           (2014). \u201cIntel Software Guard Extensions Programming Reference\u201d. url: https:\/\/software.intel.com\/sites\/default\/ files\/managed\/48\/88\/329298\u2013002.pdf."},{"key":"2025121409152109300_ref140","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1109\/SP.2015.42","volume-title":"Proceedings of the 2015 IEEE Symposium on Security and Privacy (S&P 15).","author":"Irazoqui","year":"2015"},{"key":"2025121409152109300_ref141","first-page":"299","volume-title":"Proceedings of the 2014 International Workshop on Recent Advances in Intrusion Detection.","author":"Irazoqui","year":"2014"},{"key":"2025121409152109300_ref142","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-540-24676-3_26","volume-title":"Advances in Cryptology\u2014 Eurocrypt 2004.","author":"Ishai","year":"2004"},{"key":"2025121409152109300_ref143","unstructured":"Johnson, S.\n           (2018). \u201cIntel SGX and Side-Channels\u201d. url: https:\/\/software.intel.com\/en-us\/articles\/intel-sgx-and-side-channels."},{"key":"2025121409152109300_ref144","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315317","article-title":"PORs: Proofs of Retrievability for Large Files","volume-title":"Proceedings of the 2007 ACM SIGSAC Conference on Computer and Communication Security (CCS 07).","author":"Juels","year":"2007"},{"key":"2025121409152109300_ref145","doi-asserted-by":"crossref","DOI":"10.1145\/2382196.2382298","article-title":"Dynamic Searchable Symmetric Encryption","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security.","author":"Kamara","year":"2012"},{"key":"2025121409152109300_ref146","unstructured":"Kaplan, D.\n           (2017). \u201cProtecting VM register state with SEV-ES\u201d. url: https:\/\/www.amd.com\/system\/files\/TechDocs\/Protecting%5C%20VM%5C%20Register%5C%20State%5C%20with%5C%20SEV-ES.pdf."},{"key":"2025121409152109300_ref147","article-title":"AMD memory encryption","volume-title":"White paper.","author":"Kaplan","year":"2016"},{"key":"2025121409152109300_ref148","first-page":"1329","article-title":"Generic Attacks on Secure Outsourced Databases","volume-title":"Proceedings ofthe 2016 ACM SIGSAC Conference on Computer and Communications Security.","author":"Kellaris","year":"2016"},{"key":"2025121409152109300_ref149","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1145\/1815961.1816010","volume-title":"Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA 2010).","author":"Keller","year":"2010"},{"key":"2025121409152109300_ref150","first-page":"97","volume-title":"Proceedings of the 1998 European Symposium on Research in Computer Security (ESORICS 98).","author":"Kelsey","year":"1998"},{"key":"2025121409152109300_ref151","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-61078-4_16","article-title":"HCC: 100 Gbps AES-GCM Encrypted Inline DMA Transfers Between SGX Enclave and FPGA Accelerator","volume-title":"Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 20).","author":"Kida","year":"2020"},{"key":"2025121409152109300_ref152","first-page":"189","article-title":"{STEALTHMEM}: System-level protection against cache-based side channel attacks in the cloud","volume-title":"Proceedings of the 21st USENIX Security Symposium (USENIX Security 12).","author":"Kim","year":"2012"},{"issue":"3","key":"2025121409152109300_ref153","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/2678373.2665726","article-title":"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors","volume":"42","author":"Kim","year":"2014","journal-title":"ACM SIGARCH Computer Architecture News."},{"volume-title":"In Proceedings ofthe 2007 Ottawa Linux Symposium (OLS 2007).","year":"2007","author":"Kivity","key":"2025121409152109300_ref154"},{"key":"2025121409152109300_ref155","doi-asserted-by":"crossref","DOI":"10.1145\/2560537","article-title":"Comprehensive Formal Verification of an OS Microkernel","volume-title":"ACM Transactions on Computer Systems.","author":"Klein","year":"2014"},{"key":"2025121409152109300_ref156","doi-asserted-by":"crossref","DOI":"10.1145\/3230627","article-title":"Formally Verified Software in the Real World","volume-title":"Communications ofthe ACM.","author":"Klein","year":"2018"},{"key":"2025121409152109300_ref157","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/1629575.1629596","volume-title":"Proceedings ofthe 22nd ACM Symposium on Operating Systems Principles (SOSP 2009).","author":"Klein","year":"2009"},{"key":"2025121409152109300_ref158","first-page":"104","volume-title":"Annual International Cryptology Conference.","author":"Kocher","year":"1996"},{"key":"2025121409152109300_ref159","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1109\/EuroSP48549.2020.00027","volume-title":"Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P).","author":"Koschel","year":"2020"},{"key":"2025121409152109300_ref160","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611973099.13","article-title":"On the (in)Security of Hash-based Oblivious RAM and a New Balancing Scheme","volume-title":"Proceedings of the Twenty-third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 12).","author":"Kushilevitz","year":"2012"},{"key":"2025121409152109300_ref161","first-page":"806","volume-title":"Proceedings of the 16th International Symposium on Formal Methods (FM 2009).","author":"Leinenbach","year":"2009"},{"key":"2025121409152109300_ref162","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/3176258.3176315","article-title":"Secure Storage with Replication and Transparent Deduplication","volume-title":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy.","author":"Leontiadis","year":"2018"},{"key":"2025121409152109300_ref163","first-page":"67","volume-title":"International Conference on Information Security.","author":"Leontiadis","year":"2019"},{"issue":"5","key":"2025121409152109300_ref164","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/TPDS.2019.2958919","article-title":"Proofs of Physical Reliability for Cloud Storage Systems","volume":"31","author":"Li","year":"2020","journal-title":"IEEE Transactions on Parallel and Distributed Systems."},{"key":"2025121409152109300_ref165","doi-asserted-by":"crossref","DOI":"10.1007\/s10207-016-0329-x","article-title":"Write-Only Oblivious RAM-Based Privacy- Preserved Access of Outsourced Data","volume-title":"Int. J. Inf. Secur.","author":"Li","year":"2017"},{"key":"2025121409152109300_ref166","first-page":"1357","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019).","author":"Li","year":"2019"},{"key":"2025121409152109300_ref167","doi-asserted-by":"crossref","first-page":"1782","DOI":"10.1109\/SP40001.2021.00049","volume-title":"Proceedings of the 42nd IEEE Symposium on Security & Privacy (IEEE SP 2021).","author":"Li","year":"2021"},{"key":"2025121409152109300_ref168","first-page":"3953","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021).","author":"Li","year":"2021"},{"issue":"1","key":"2025121409152109300_ref169","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3387108","article-title":"Secure multiparty computation","volume":"64","author":"Lindell","year":"2021","journal-title":"Communications of the ACM."},{"article-title":"Secure Multiparty Computation for Privacy-Preserving Data Mining","year":"2008","author":"Lindell","key":"2025121409152109300_ref170"},{"key":"2025121409152109300_ref171","doi-asserted-by":"crossref","DOI":"10.1145\/3167132.3167151","article-title":"A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines","volume-title":"Proceedings of the 33rd Annual ACM Symposium on Applied Computing.","author":"Lindemann","year":"2018"},{"key":"2025121409152109300_ref172","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","article-title":"Search pattern leakage in searchable encryption: Attacks and new construction","volume":"265","author":"Liu","year":"2014","journal-title":"Inf. Sci."},{"key":"2025121409152109300_ref173","first-page":"406","volume-title":"Proceedings of the 2016 IEEE international symposium on high performance computer architecture (HPCA 16).","author":"Liu","year":"2016"},{"key":"2025121409152109300_ref174","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/SP.2015.43","volume-title":"Proceedings ofthe 2015 IEEE symposium on security and privacy (S&P 15).","author":"Liu","year":"2015"},{"issue":"4","key":"2025121409152109300_ref175","doi-asserted-by":"crossref","first-page":"10051013","DOI":"10.4304\/jcp.9.4.1005-1013","article-title":"Mitigating cross-VM side channel attack on multiple tenants cloud platform","volume":"9","author":"Liu","year":"2014","journal-title":"J. Comput."},{"key":"2025121409152109300_ref176","first-page":"1607","volume-title":"Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015).","author":"Liu","year":"2015"},{"key":"2025121409152109300_ref177","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-61204-1_32","article-title":"Maliciously Secure Multi-Client ORAM","volume-title":"Applied Cryptography and Network Security.","author":"Maffei","year":"2017"},{"key":"2025121409152109300_ref178","unstructured":"Magouryk, C.\n           (2021). \u201cArm-based cloud computing is the next big thing: Introducing Arm on Oracle Cloud Infrastructure\u201d. URL: https:\/\/blogs.oracle.com\/cloud-infrastructure\/post\/arm-based-cloud-computing-is-the-next-big-thing-introducing-arm-on-oracle-cloud-infrastructure."},{"key":"2025121409152109300_ref179","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23194","article-title":"Thunderclap: Exploring vulnerabilities in Operating System IOMMU protection via DMA from untrustworthy peripherals","volume-title":"Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 19).","author":"Markettos","year":"2019"},{"key":"2025121409152109300_ref180","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/ISCA.2012.6237011","volume-title":"Proceedings of the 2012 39th Annual International Symposium on Computer Architecture (ISCA 12).","author":"Martin","year":"2012"},{"key":"2025121409152109300_ref181","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/SP.2010.17","volume-title":"Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP 2010).","author":"McCune","year":"2010"},{"key":"2025121409152109300_ref182","unstructured":"\u201cMicrosoft Azure Key Vault\u201d.\n           URL: https:\/\/azure.microsoft.com\/en-us\/services\/key-vault\/."},{"key":"2025121409152109300_ref183","first-page":"279","volume-title":"Proceedings of the 7th Symposium on Operating Systems and Implementation (OSDI 2006).","author":"Ta-Min","year":"2006"},{"key":"2025121409152109300_ref184","first-page":"1595","article-title":"Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 15).","author":"Moon","year":"2015"},{"key":"2025121409152109300_ref185","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/1346256.1346278","volume-title":"Proceedings of the 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE 2008).","author":"Murray","year":"2008"},{"key":"2025121409152109300_ref186","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23349","article-title":"HOP: Hardware makes Obfuscation Practical","volume-title":"Proceedings of the 2017 ISOC Network and Distributed System Security Symposium (NDSS 17)","author":"Nayak","year":"2017"},{"key":"2025121409152109300_ref187","first-page":"1141","article-title":"An Oblivious Parallel RAM with O(log2 N) Parallel Runtime Blowup","volume-title":"IACR Cryptology ePrint Archive.","author":"Nayak","year":"2016"},{"key":"2025121409152109300_ref188","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/2168836.2168851","volume-title":"Proceedings of the 7th ACM European Conference on Computer Systems (EuroSys 2012).","author":"Nguyen","year":"2012"},{"volume-title":"Proceedings of the 26th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021).","year":"2021","author":"Oberhauser","key":"2025121409152109300_ref189"},{"key":"2025121409152109300_ref190","article-title":"Oblivious Multi-Party Machine Learning on Trusted Processors","volume-title":"Proceedings ofthe 25th USENIX Security Symposium (USENIX Security 16).","author":"Ohrimenko","year":"2016"},{"key":"2025121409152109300_ref191","first-page":"1","volume-title":"Cryptographers\u2019 track at the RSA conference.","author":"Osvik","year":"2006"},{"key":"2025121409152109300_ref192","doi-asserted-by":"crossref","DOI":"10.1109\/PCCC.2011.6108094","article-title":"Non-Interactive OS Fingerprinting through Memory de-Duplication Technique in Virtual Machines","volume-title":"Proceedings of the 30th IEEE International Performance Computing and Communications Conference.","author":"Owens","year":"2011"},{"key":"2025121409152109300_ref193","article-title":"Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21).","author":"Oya","year":"2021"},{"key":"2025121409152109300_ref194","article-title":".","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21).","author":"Paccagnella","year":"2021"},{"key":"2025121409152109300_ref195","unstructured":"Page, D.\n           (2005). \u201cPartitioned cache architecture as a side-channel defence mechanism\u201d. url: https:\/\/ia.cr\/2005\/280."},{"key":"2025121409152109300_ref196","first-page":"1","article-title":".","volume-title":"IACR Cryptol. ePrint Arch.","author":"Page","year":"2002"},{"key":"2025121409152109300_ref197","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2014.30","article-title":"Blind Seer: A Scalable Private DBMS","volume-title":"Proceedings of the 2014 IEEE Symposium on Security and Privacy (S&P 14).","author":"Pappas","year":"2014"},{"key":"2025121409152109300_ref198","doi-asserted-by":"crossref","DOI":"10.1109\/FOCS.2018.00087","article-title":"PanORAMa: Oblivious RAM with Logarithmic Overhead","volume-title":"IEEE Annual Symposium on Foundations of Computer Science (FOCS 18).","author":"Patel","year":"2018"},{"article-title":"Cache missing for fun and profit","year":"2005","author":"Percival","key":"2025121409152109300_ref199"},{"key":"2025121409152109300_ref200","first-page":"565","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium. SEC\u201916.","author":"Pessl","year":"2016"},{"key":"2025121409152109300_ref201","article-title":"A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud","volume-title":"Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing.","author":"Peterson","year":"2011"},{"key":"2025121409152109300_ref202","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14623-7_27","article-title":"Oblivious RAM Revisited","volume-title":"Proceedings of the 30th Annual Conference on Advances in Cryptology (CRYPTO 10)","author":"Pinkas","year":"2010"},{"key":"2025121409152109300_ref203","doi-asserted-by":"crossref","DOI":"10.1145\/2043556.2043566","article-title":"CryptDB: Protecting Confidentiality with Encrypted Query Processing","volume-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles.","author":"Popa","year":"2011"},{"key":"2025121409152109300_ref204","unstructured":"Protocol Labs.\n           (2017a). \u201cFilecoin: A decentralized storage network\u201d. url: https:\/\/filecoin.io\/filecoin.pdf."},{"key":"2025121409152109300_ref205","unstructured":"Protocol\n              Labs.\n            \n           (2017b). \u201cProof of replication\u201d. url: https:\/\/filecoin.io\/proof-of-replication.pdf."},{"key":"2025121409152109300_ref206","first-page":"73","volume-title":"Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC).","author":"Rabin","year":"1989"},{"key":"2025121409152109300_ref207","first-page":"1","article-title":"Flip feng shui: Hammering a needle in the software stack","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 16).","author":"Razavi","year":"2016"},{"key":"2025121409152109300_ref208","article-title":"Constants Count: Practical Improvements to Oblivious RAM","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security 15).","author":"Ren","year":"2015"},{"key":"2025121409152109300_ref209","doi-asserted-by":"crossref","DOI":"10.1145\/2485922.2485971","article-title":"Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors","author":"Ren","year":"2013"},{"key":"2025121409152109300_ref210","first-page":"1","volume-title":"Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008).","author":"Riley","year":"2008"},{"key":"2025121409152109300_ref211","first-page":"199","article-title":"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds","volume-title":"Proceedings ofthe 16th ACM conference on Computer and communications security.","author":"Ristenpart","year":"2009"},{"key":"2025121409152109300_ref212","doi-asserted-by":"crossref","DOI":"10.1145\/3133956.3134051","article-title":"Deterministic, Stash-Free Write-Only ORAM","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 17).","author":"Roche","year":"2017"},{"key":"2025121409152109300_ref213","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2016.20","article-title":"TaoStore: Overcoming Asynchronicity in Oblivious Data Storage","volume-title":"Proceedings of the 2016 IEEE Symposium on Security and Privacy (S&P 16).","author":"Sahin","year":"2016"},{"key":"2025121409152109300_ref214","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23239","article-title":"ZeroTrace: Oblivious Memory Primitives from Intel SGX","volume-title":"Proceedings ofthe 2018 ISOC Network and Distributed System Security Symposium (NDSS 18).","author":"Sasy","year":"2018"},{"volume-title":"Proceedings of the 2006 IEEE International Conference on Distributed Computing Systems (ICDCS 06).","year":"2006","author":"Schwarz","key":"2025121409152109300_ref215"},{"key":"2025121409152109300_ref216","article-title":"Time-Bounded Remote File Checking","volume-title":"Tech. rep.","author":"Sebe","year":"2004"},{"key":"2025121409152109300_ref217","unstructured":"\u201cSecurity Requirements for Cryptographic Modules\u201d.\n           url: https:\/\/nvlpubs.nist.gov."},{"key":"2025121409152109300_ref218","unstructured":"\u201cseL4 Reference Manual Version 11.0.0\u201d.\n           (2019). Data61. url: http:\/\/sel4.systems\/Info\/Docs\/seL4-manual-11.0.0.pdf."},{"key":"2025121409152109300_ref219","unstructured":"\u201cseL4 Supported Platforms\u201d.\n           url: https:\/\/docs.sel4.systems\/Hardware."},{"key":"2025121409152109300_ref220","doi-asserted-by":"crossref","first-page":"335\u2013","DOI":"10.1145\/1294261.1294294","volume-title":"Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP 2007).","author":"Seshadri","year":"2007"},{"key":"2025121409152109300_ref221","article-title":"Compact Proofs of Retrievabil-ity","volume-title":"Proceedings of the Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2008).","author":"Shacham","year":"2008"},{"issue":"3","key":"2025121409152109300_ref222","first-page":"442","article-title":"Compact Proofs of Retrievability\u201d. J. Cryptol.","volume":"26","author":"Shacham","year":"2013"},{"key":"2025121409152109300_ref223","article-title":"Auditing to Keep Online Storage Services Honest","volume-title":"Proceedings ofthe 11th Workshop on Hot Topics in Operating Systems (HotOS XI).","author":"Shah","year":"2007"},{"key":"2025121409152109300_ref224","article-title":"Privacy-Preserving Audit and Extraction of Digital Contents","volume-title":"ePrint Archive Report.","author":"Shah","year":"2008"},{"key":"2025121409152109300_ref225","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/978-3-030-58951-6_30","volume-title":"Computer Security - ESORICS 2020.","author":"Shen","year":"2020"},{"key":"2025121409152109300_ref226","doi-asserted-by":"crossref","DOI":"10.1109\/SP40000.2020.00037","article-title":"Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue","volume-title":"Proceedings of the 2020 IEEE Symposium on Security and Privacy (S&P 20).","author":"Shi","year":"2020"},{"key":"2025121409152109300_ref227","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-25385-0_11","article-title":"Oblivious RAM with O((Logn)3) Worst-case Cost","volume-title":"Proceedings of the 17th International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT 11)","author":"Shi","year":"2011"},{"key":"2025121409152109300_ref228","first-page":"325","article-title":"Practical Dynamic Proofs of Retrievability","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 13).","author":"Shi","year":"2013"},{"key":"2025121409152109300_ref229","first-page":"194","volume-title":"Proceedings of the 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).","author":"Shi","year":"2011"},{"volume-title":"24th Annual Network and Distributed System Security Symposium (NDSS 2017).","year":"2017","author":"Shi","key":"2025121409152109300_ref230"},{"key":"2025121409152109300_ref231","first-page":"45","volume-title":"Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security 2016).","author":"Shih","year":"2016"},{"key":"2025121409152109300_ref232","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1508293.1508311","volume-title":"Proceedings ofthe 2009 ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE 2009).","author":"Shinagawa","year":"2009"},{"key":"2025121409152109300_ref233","unstructured":"Siemens.\n           (2019). \u201cjailhouse - Linux-based partitioning hypervisor\u201d. URL: https:\/\/github.com\/siemens\/jailhouse."},{"volume-title":"SP \u201800: Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P 2000).","year":"2000","author":"Song","key":"2025121409152109300_ref234"},{"key":"2025121409152109300_ref235","article-title":"A novel scheduling framework leveraging hardware cache partitioning for cache-side-channel elimination in clouds","volume-title":"arXiv preprint arXiv:1708.09538.","author":"Sprabery","year":"2017"},{"key":"2025121409152109300_ref236","first-page":"229","article-title":"Iris: A Scalable Cloud File System with Efficient Integrity Checks","volume-title":"Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 12).","author":"Stefanov","year":"2012"},{"key":"2025121409152109300_ref237","doi-asserted-by":"crossref","DOI":"10.1145\/2508859.2516660","article-title":"Path ORAM: An Extremely Simple Oblivious RAM Protocol","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer &#38; Communications Security (CCS 13)","author":"Stefanov","year":"2013"},{"key":"2025121409152109300_ref238","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/1755913.1755935","volume-title":"Proceedings of the 5th European Conference on Computer Systems (EuroSys 2010).","author":"Steinberg","year":"2010"},{"key":"2025121409152109300_ref239","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2382196.2382200","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012).","author":"Strackx","year":"2012"},{"key":"2025121409152109300_ref240","doi-asserted-by":"crossref","DOI":"10.1145\/1972551.1972552","article-title":"Memory Dedupli-cation as a Threat to the Guest OS","volume-title":"Proceedings of the Fourth European Workshop on System Security.","author":"Suzaki","year":"2011"},{"key":"2025121409152109300_ref241","first-page":"866","volume-title":"Proceedings of the 28th ACM Symposium on Operating Systems Principles (SOSP 2021).","author":"Tao","year":"2021"},{"key":"2025121409152109300_ref242","unstructured":"TrendForce.\n           (2021). \u201cIntel Responds to AMD\u2019s Challenge with Ice Lake CPUs as Competition in Server Market Intensifies\u201d. URL: https:\/\/www.trendforce.com\/presscenter\/news\/20210318\u201310723.html."},{"issue":"1","key":"2025121409152109300_ref243","first-page":"37","article-title":"Efficient cache attacks on AES, and countermeasures","volume":"23","author":"Tromer","year":"2010","journal-title":"Journal ofCryptology."},{"key":"2025121409152109300_ref244","first-page":"1","volume-title":"Proceedings ofthe 9th European Conference on Computer Systems (EuroSys 2014).","author":"Tsai","year":"2014"},{"key":"2025121409152109300_ref245","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Proceedings of the 2003 International Workshop on Cryptographic Hardware and Embedded Systems.","author":"Tsunoo","year":"2003"},{"key":"2025121409152109300_ref246","first-page":"687","article-title":"Scheduler-based defenses against cross-VM side-channels","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14).","author":"Varadarajan","year":"2014"},{"key":"2025121409152109300_ref247","first-page":"913","article-title":"A placement vulnerability study in multi-tenant public clouds","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security 15).","author":"Varadarajan","year":"2015"},{"key":"2025121409152109300_ref248","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/SP.2013.36","volume-title":"Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP 2013).","author":"Vasudevan","year":"2013"},{"key":"2025121409152109300_ref249","first-page":"87","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 2016).","author":"Vasudevan","year":"2016"},{"key":"2025121409152109300_ref250","doi-asserted-by":"crossref","DOI":"10.1109\/ICDCS.2018.00076","article-title":"SGX-Aware Container Orchestration for Heterogeneous Clusters","volume-title":"Proceedings of the 38th International Conference on Distributed Computing Systems (ICDCS 18)","author":"Vaucher","year":"2018"},{"key":"2025121409152109300_ref251","article-title":"Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect","volume-title":"arXiv preprint arXiv:2103.04533.","author":"Wan","year":"2021"},{"key":"2025121409152109300_ref252","doi-asserted-by":"crossref","DOI":"10.1145\/3133956.3134038","article-title":"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.","author":"Wang","year":"2017"},{"key":"2025121409152109300_ref253","doi-asserted-by":"crossref","DOI":"10.1145\/2810103.2813634","article-title":"Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound","volume-title":"Proceedings ofthe ACM Conference on Cloud and Computer Security (CCS 15)","author":"Wang","year":"2015"},{"key":"2025121409152109300_ref254","unstructured":"Wang, X., A. J.Malozemoff, and J.Katz. (2016). \u201cEMPtoolkit: Efficient MultiParty computation toolkit\u201d. URL: https:\/\/github.com\/emp-toolkit."},{"key":"2025121409152109300_ref255","first-page":"347","volume-title":"Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC 2015).","author":"Wang","year":"2015"},{"key":"2025121409152109300_ref256","doi-asserted-by":"crossref","first-page":"494\ud840\udd32","DOI":"10.1145\/1250662.1250723","article-title":"New cache designs for thwarting software cache-based side channel attacks","volume-title":"Proceedings ofthe 34th annual international symposium on Computer architecture.","author":"Wang","year":"2007"},{"key":"2025121409152109300_ref257","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MICRO.2008.4771781","volume-title":"2008 41st IEEE\/ACM International Symposium on Microarchitecture.","author":"Wang","year":"2008"},{"key":"2025121409152109300_ref258","first-page":"545","volume-title":"Proceedings ofthe 16th ACM Conference on Computer and Communications Security (CCS 2009).","author":"Wang","year":"2009"},{"key":"2025121409152109300_ref259","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1145\/2168836.2168850","volume-title":"Proceedings of the 7th ACM European Conference on Computer Systems (EuroSys 2012).","author":"Wang","year":"2012"},{"key":"2025121409152109300_ref260","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/2381913.2381926","volume-title":"Proceedings of the 2012 ACM Cloud Computing Security Workshop (CCSW 12).","author":"Watson","year":"2012"},{"key":"2025121409152109300_ref261","first-page":"675","article-title":"Scattercache: Thwarting cache attacks via cache set randomization","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 19).","author":"Werner","year":"2019"},{"key":"2025121409152109300_ref262","article-title":"Usable PIR","volume-title":"Proceedings of the 2008 ISOC Network and Distributed System Security Symposium (NDSS 08).","author":"Williams","year":"2008"},{"volume-title":"Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communication Security (CCS 12).","year":"2012","author":"Williams","key":"2025121409152109300_ref263"},{"key":"2025121409152109300_ref264","doi-asserted-by":"crossref","DOI":"10.1145\/1455770.1455790","article-title":"Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage","volume-title":"Proceedings ofthe 15th ACM Conference on Computer and Communications Security (CCS 08).","author":"Williams","year":"2008"},{"key":"2025121409152109300_ref265","doi-asserted-by":"crossref","DOI":"10.1145\/2382196.2382299","article-title":"PrivateFS: A Parallel Oblivious File System","volume-title":"Proceedings ofthe 2012 ACM Conference on Computer and Communications Security (CCS 12).","author":"Williams","year":"2012"},{"volume-title":"20th Annual Network and Distributed System Security Symposium (NDSS 2013).","year":"2013","author":"Wu","key":"2025121409152109300_ref266"},{"key":"2025121409152109300_ref267","article-title":"Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud","volume-title":"21st USENIX Security Symposium (USENIX Security 12).","author":"Wu","year":"2012"},{"key":"2025121409152109300_ref268","doi-asserted-by":"crossref","DOI":"10.1109\/DSN.2013.6575349","article-title":"Security Implications of Memory Deduplication in a Virtualized Environment","volume-title":"Proceedings of the 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. DSN \u201813.","author":"Xiao","year":"2013"},{"key":"2025121409152109300_ref269","first-page":"19","article-title":"One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation","volume-title":"Proceedings ofthe 25th USENIX security symposium (USENIX security 16).","author":"Xiao","year":"2016"},{"key":"2025121409152109300_ref270","first-page":"929","article-title":"A measurement study on co-residence threat inside the cloud","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security 15).","author":"Xu","year":"2015"},{"key":"2025121409152109300_ref271","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1346256.1346267","volume-title":"Proceedings of the 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE 2008).","author":"Yang","year":"2008"},{"key":"2025121409152109300_ref272","first-page":"162","volume-title":"Proceedings of the 27th Annual Symposium on Foundations of Computer Science (FOCS).","author":"Yao","year":"1986"},{"key":"2025121409152109300_ref273","first-page":"719","article-title":"FLUSH+ RELOAD: A high resolution, low noise, L3 cache side-channel attack","volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14).","author":"Yarom","year":"2014"},{"key":"2025121409152109300_ref274","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23061","article-title":"Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing","volume-title":"Proceedings ofthe Annual Network and Distributed System Security Symposium (NDSS 19)","author":"Yu","year":"2019"},{"key":"2025121409152109300_ref275","first-page":"203","volume-title":"Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP 2011).","author":"Zhang","year":"2011"},{"key":"2025121409152109300_ref276","first-page":"118","volume-title":"International Symposium on Research in Attacks, Intrusions, and Defenses.","author":"Zhang","year":"2016"},{"key":"2025121409152109300_ref277","first-page":"313","volume-title":"Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P 11).","author":"Zhang","year":"2011"},{"key":"2025121409152109300_ref278","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/2382196.2382230","article-title":"Cross-VM side channels and their use to extract private keys","volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security (CCS 12).","author":"Zhang","year":"2012"},{"key":"2025121409152109300_ref279","first-page":"990","article-title":"Cross-tenant side-channel attacks in PaaS clouds","volume-title":"Proceedings ofthe 2014 ACM SIGSAC Conference on Computer and Communications Security.","author":"Zhang","year":"2014"},{"key":"2025121409152109300_ref280","first-page":"827","article-title":"Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS 13).","author":"Zhang","year":"2013"},{"key":"2025121409152109300_ref281","first-page":"871","article-title":"A software approach to defeating side channels in last-level caches","volume-title":"Proceedings ofthe 2016 ACM SIGSAC Conference on Computer and Communications Security.","author":"Zhou","year":"2016"},{"key":"2025121409152109300_ref282","first-page":"616","article-title":"Building verifiable trusted path on commodity x86 computers","volume-title":"Proceedings ofthe 33rd IEEE symposium on security and privacy (IEEE S&P 12).","author":"Zhou","year":"2012"},{"key":"2025121409152109300_ref283","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/SP.2014.27","volume-title":"Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP 2014).","author":"Zhou","year":"2014"},{"key":"2025121409152109300_ref284","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/3050748.3050767","volume-title":"Proceedings of the 13th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE 2017).","author":"Zhu","year":"2017"}],"container-title":["Foundations and Trends\u00ae in Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftsec\/article-pdf\/3\/2\/103\/11041919\/3300000028en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftsec\/article-pdf\/3\/2\/103\/11041919\/3300000028en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T14:16:11Z","timestamp":1765721771000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftsec\/article\/3\/2\/103\/1328023\/Cloud-Computing-Security-Foundations-and-Research"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":284,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2,22]]}},"URL":"https:\/\/doi.org\/10.1561\/3300000028","relation":{},"ISSN":["2474-1558","2474-1566"],"issn-type":[{"type":"print","value":"2474-1558"},{"type":"electronic","value":"2474-1566"}],"subject":[],"published":{"date-parts":[[2022,2,22]]}}}