{"id":"https://openalex.org/W4405181298","doi":"https://doi.org/10.1145/3658644.3690203","title":"Specification and Verification of Strong Timing Isolation of Hardware Enclaves","display_name":"Specification and Verification of Strong Timing Isolation of Hardware Enclaves","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181298","doi":"https://doi.org/10.1145/3658644.3690203"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690203","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690203","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690203","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690203","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030226160","display_name":"Stella Lau","orcid":"https://orcid.org/0000-0003-3921-9440"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Stella Lau","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031573662","display_name":"Thomas Bourgeat","orcid":"https://orcid.org/0000-0002-8468-8409"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Thomas Bourgeat","raw_affiliation_strings":["EPFL, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018186543","display_name":"Cl\u00e9ment Pit-Claudel","orcid":"https://orcid.org/0000-0002-1900-3901"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Cl\u00e9ment Pit-Claudel","raw_affiliation_strings":["EPFL, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078100439","display_name":"Adam Chlipala","orcid":"https://orcid.org/0000-0001-7085-9417"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Chlipala","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030226160"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.3407,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68946196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1121","last_page":"1135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7948408126831055},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7432422637939453},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.7036600112915039},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6294659376144409},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5995029807090759},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5160827040672302},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5048616528511047},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.47747802734375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4555283188819885},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.4501946270465851},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4280356466770172},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3584153652191162},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3332139253616333},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11089104413986206},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09249526262283325}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7948408126831055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7432422637939453},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.7036600112915039},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6294659376144409},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5995029807090759},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5160827040672302},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5048616528511047},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.47747802734375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4555283188819885},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.4501946270465851},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4280356466770172},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3584153652191162},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3332139253616333},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11089104413986206},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09249526262283325},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3658644.3690203","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690203","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690203","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:dspace.mit.edu:1721.1/158084","is_oa":true,"landing_page_url":"https://hdl.handle.net/1721.1/158084","pdf_url":"https://dspace.mit.edu/bitstream/1721.1/158084/1/3658644.3690203.pdf","source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Association for Computing Machinery","raw_type":"http://purl.org/eprint/type/ConferencePaper"},{"id":"pmh:oai:infoscience.epfl.ch:20.500.14299/246765","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/246765","pdf_url":"https://infoscience.epfl.ch/bitstreams/e8f98a4c-2556-4860-b544-e89619213434/download","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference proceedings"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690203","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690203","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690203","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G529548107","display_name":null,"funder_award_id":"CCF-1521584","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6432411175","display_name":null,"funder_award_id":"HR001118C0018","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320316896","display_name":"Seagate Technology","ror":"https://ror.org/04p1xtv71"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338291","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181298.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1503814339","https://openalex.org/W1934458198","https://openalex.org/W2168113051","https://openalex.org/W2182467309","https://openalex.org/W2415236938","https://openalex.org/W2762625979","https://openalex.org/W2767174522","https://openalex.org/W2896496024","https://openalex.org/W2904129921","https://openalex.org/W2976763854","https://openalex.org/W2979547870","https://openalex.org/W2981791963","https://openalex.org/W3021475380","https://openalex.org/W3033189783","https://openalex.org/W3152853872","https://openalex.org/W3153387123","https://openalex.org/W4281986595","https://openalex.org/W4313005051","https://openalex.org/W4380881134","https://openalex.org/W4388858498","https://openalex.org/W6930555847"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W3121667336"],"abstract_inverted_index":{"The":[0],"process":[1],"isolation":[2],"enforceable":[3],"by":[4],"commodity":[5],"hardware":[6,41],"and":[7,49,63],"operating":[8],"systems":[9],"is":[10],"too":[11],"weak":[12],"to":[13,36],"protect":[14],"secrets":[15],"from":[16,30,53],"malicious":[17],"code":[18],"running":[19],"on":[20,32],"the":[21],"same":[22],"machine:":[23],"attacks":[24],"exploit":[25],"timing":[26,56],"side":[27,57],"channels":[28],"derived":[29],"contention":[31],"shared":[33],"microarchitectural":[34],"resources":[35],"extract":[37],"secrets.":[38],"With":[39],"appropriate":[40],"support,":[42],"however,":[43],"we":[44],"can":[45],"construct":[46],"isolated":[47],"enclaves":[48],"safeguard":[50],"independent":[51],"processes":[52],"interference":[54],"through":[55],"channels,":[58],"a":[59],"step":[60],"towards":[61],"confidentiality":[62],"integrity":[64],"guarantees.":[65]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
