{"id":"https://openalex.org/W4308642193","doi":"https://doi.org/10.1145/3548606.3560620","title":"NARRATOR","display_name":"NARRATOR","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308642193","doi":"https://doi.org/10.1145/3548606.3560620"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560620","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560620","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560620","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560620","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081705982","display_name":"Jianyu Niu","orcid":"https://orcid.org/0000-0001-5253-941X"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianyu Niu","raw_affiliation_strings":["Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100701902","display_name":"Wei Peng","orcid":"https://orcid.org/0000-0003-1010-8632"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Peng","raw_affiliation_strings":["Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071738824","display_name":"Xiaokuan Zhang","orcid":"https://orcid.org/0000-0002-4646-7146"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaokuan Zhang","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081705982"],"corresponding_institution_ids":["https://openalex.org/I3045169105"],"apc_list":null,"apc_paid":null,"fwci":2.2012,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.89866441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2385","last_page":"2399"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8466743230819702},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6389463543891907},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5235516428947449},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4935365915298462},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4809538424015045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4712769389152527},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4633389711380005},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.4515378773212433},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4385334551334381},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3657292127609253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8466743230819702},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6389463543891907},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5235516428947449},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4935365915298462},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4809538424015045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4712769389152527},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4633389711380005},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.4515378773212433},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4385334551334381},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3657292127609253},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3560620","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560620","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560620","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3548606.3560620","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560620","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560620","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308642193.pdf","grobid_xml":"https://content.openalex.org/works/W4308642193.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W95608104","https://openalex.org/W189798858","https://openalex.org/W2042494357","https://openalex.org/W2049913483","https://openalex.org/W2061643296","https://openalex.org/W2064901846","https://openalex.org/W2093460657","https://openalex.org/W2103131117","https://openalex.org/W2132779253","https://openalex.org/W2151241899","https://openalex.org/W2518442919","https://openalex.org/W2577111091","https://openalex.org/W2584120063","https://openalex.org/W2593994116","https://openalex.org/W2734941459","https://openalex.org/W2763398287","https://openalex.org/W2766738123","https://openalex.org/W2795222609","https://openalex.org/W2797481382","https://openalex.org/W2886636392","https://openalex.org/W2896071999","https://openalex.org/W2947356748","https://openalex.org/W2947718647","https://openalex.org/W2979777917","https://openalex.org/W2982003166","https://openalex.org/W3013965090","https://openalex.org/W3081471180","https://openalex.org/W3102600874","https://openalex.org/W3179767012","https://openalex.org/W3189212399","https://openalex.org/W3195118109","https://openalex.org/W4221007779","https://openalex.org/W4235385348","https://openalex.org/W4248786552","https://openalex.org/W4289038676","https://openalex.org/W4300127641","https://openalex.org/W6682904396","https://openalex.org/W6695414191","https://openalex.org/W6724020243","https://openalex.org/W6743706254","https://openalex.org/W6752964981"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W1565271071","https://openalex.org/W2081199208","https://openalex.org/W3211706803","https://openalex.org/W3160870209","https://openalex.org/W4382775358","https://openalex.org/W3349016","https://openalex.org/W4246942721"],"abstract_inverted_index":{"Public":[0],"cloud":[1,118],"platforms":[2],"have":[3],"leveraged":[4],"Trusted":[5],"Execution":[6],"Environment":[7],"(TEE)":[8],"technology":[9],"to":[10,33,132,175,206],"provide":[11],"confidential":[12],"computing":[13],"services.":[14],"However,":[15],"TEE-protected":[16],"applications":[17,116],"still":[18],"suffer":[19,67],"from":[20,68],"rollback":[21],"or":[22,37,66],"forking":[23],"attacks,":[24],"in":[25,44,117,215,247],"which":[26],"their":[27],"states":[28],"could":[29],"be":[30,38],"rolled":[31],"back":[32],"a":[34,85,94,134,146,163,189,197,216,254],"stale":[35],"version":[36,165],"forked":[39],"into":[40],"multiple":[41],"versions,":[42],"resulting":[43],"state":[45,75,106,113,156,177,227],"continuity":[46,107,157],"violations.":[47],"Existing":[48],"solutions":[49],"against":[50],"these":[51],"attacks":[52],"either":[53],"rely":[54],"on":[55,60,93,185,193],"weak":[56],"threat":[57],"models":[58],"based":[59],"centralized":[61],"trust":[62,143],"(e.g.,":[63,72],"trusted":[64],"server)":[65],"large":[69],"performance":[70],"overheads":[71],"tens":[73],"of":[74,137,166,191,200],"updates":[76,114,178,228],"per":[77,229],"second).":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"propose":[83],"Narrator,":[84],"secure":[86],"and":[87,99,101,111,171,202,249],"practical":[88],"system,":[89],"(1)":[90],"that":[91,103,214,246],"relies":[92],"blockchain":[95,131],"(i.e.,":[96,196],"decentralized":[97,142],"trust)":[98],"TEEs,":[100,138],"(2)":[102],"provides":[104,154],"high-performance":[105],"protection":[108],"like":[109],"unlimited":[110],"fast":[112],"for":[115],"TEEs.":[119],"The":[120,240],"intuition":[121],"behind":[122],"our":[123],"design":[124,128,199],"is":[125,242],"simple.":[126],"Our":[127,159,210],"uses":[129],"the":[130,141,151,167,233],"initialize":[133],"distributed":[135,152,160],"system":[136,153,161],"laying":[139],"down":[140],"base":[144],"with":[145,180,219],"small":[147],"interaction":[148],"overhead,":[149],"while":[150],"performant":[155],"protection.":[158],"adopts":[162],"customized":[164],"consistent":[168],"broadcast":[169],"protocol":[170],"leverages":[172],"advanced":[173],"techniques":[174],"make":[176],"processed":[179],"one":[181],"round":[182],"trip":[183],"delay":[184],"average.":[186],"We":[187],"build":[188],"proof-of-concept":[190],"Narrator":[192,222],"Intel":[194],"SGX":[195],"representative":[198],"TEEs)":[201],"do":[203],"extensive":[204],"experiments":[205],"evaluate":[207],"its":[208],"performance.":[209],"evaluation":[211],"results":[212],"show":[213],"LAN":[217],"environment":[218],"5":[220],"nodes,":[221],"can":[223],"support":[224],"about":[225],"6k":[226],"second,":[230],"meanwhile":[231],"keeping":[232],"latency":[234],"as":[235,237],"low":[236],"3-8":[238],"ms.":[239],"throughput":[241],"30x":[243],"larger":[244,251],"than":[245,252],"ROTE":[248],"70x":[250],"using":[253],"TPM":[255],"counter.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2022-11-13T00:00:00"}
