{"id":"https://openalex.org/W2769824527","doi":"https://doi.org/10.1145/3152701.3152709","title":"SGX-Bomb","display_name":"SGX-Bomb","publication_year":2017,"publication_date":"2017-10-28","ids":{"openalex":"https://openalex.org/W2769824527","doi":"https://doi.org/10.1145/3152701.3152709","mag":"2769824527"},"language":"en","primary_location":{"id":"doi:10.1145/3152701.3152709","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3152701.3152709","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3152709&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on System Software for Trusted Execution","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3152709&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081925472","display_name":"Yeongjin Jang","orcid":"https://orcid.org/0000-0003-4368-9736"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yeongjin Jang","raw_affiliation_strings":["Oregon State University"],"affiliations":[{"raw_affiliation_string":"Oregon State University","institution_ids":["https://openalex.org/I131249849"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011205347","display_name":"Jaehyuk Lee","orcid":"https://orcid.org/0000-0001-7113-1161"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]},{"id":"https://openalex.org/I4210099236","display_name":"Kootenay Association for Science & Technology","ror":"https://ror.org/011pv9p44","country_code":"CA","type":"nonprofit","lineage":["https://openalex.org/I4210099236"]}],"countries":["CA","KR"],"is_corresponding":false,"raw_author_name":"Jaehyuk Lee","raw_affiliation_strings":["KAIST"],"affiliations":[{"raw_affiliation_string":"KAIST","institution_ids":["https://openalex.org/I4210099236","https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100330701","display_name":"Sangho Lee","orcid":"https://orcid.org/0000-0002-0412-7768"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sangho Lee","raw_affiliation_strings":["Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100743709","display_name":"Taesoo Kim","orcid":"https://orcid.org/0000-0002-7440-2067"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taesoo Kim","raw_affiliation_strings":["Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081925472"],"corresponding_institution_ids":["https://openalex.org/I131249849"],"apc_list":null,"apc_paid":null,"fwci":9.9781,"has_fulltext":true,"cited_by_count":136,"citation_normalized_percentile":{"value":0.98419276,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7438376545906067},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.7064511775970459},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.6983509063720703},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6816197633743286},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.6539362668991089},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.588089108467102},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5782028436660767},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5739256143569946},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5417263507843018},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4935504198074341},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.4259053170681},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.30079153180122375},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.19674843549728394},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.1058310866355896},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.1046905517578125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7438376545906067},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.7064511775970459},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.6983509063720703},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6816197633743286},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.6539362668991089},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.588089108467102},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5782028436660767},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5739256143569946},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5417263507843018},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4935504198074341},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.4259053170681},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.30079153180122375},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.19674843549728394},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.1058310866355896},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.1046905517578125},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3152701.3152709","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3152701.3152709","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3152709&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on System Software for Trusted Execution","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3152701.3152709","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3152701.3152709","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3152709&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on System Software for Trusted Execution","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8399999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1627094294","display_name":"SaTC-EDU: EAGER: Big Data and Security: Educating the Next-Generation Security Analysts","funder_award_id":"1500084","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1795727596","display_name":null,"funder_award_id":"DGE-1500084","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2024950750","display_name":null,"funder_award_id":"CRI-1629851","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3337934819","display_name":null,"funder_award_id":"N000141512162","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G3371991119","display_name":null,"funder_award_id":"HR0011-16-C-0059","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G3998797464","display_name":null,"funder_award_id":"N0001415","funder_id":"https://openalex.org/F4320334879","funder_display_name":"Korea Evaluation Institute of Industrial Technology"},{"id":"https://openalex.org/G4728784257","display_name":"CI-P: Collaborative: Planning for a Community-Driven Open Research Infrastructure to Support Secure Computing Research involving Intel SGX","funder_award_id":"1629851","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4935764341","display_name":null,"funder_award_id":"CNS-1704701","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5051192394","display_name":null,"funder_award_id":"FA8650-15-C","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5199875135","display_name":null,"funder_award_id":"DARPA FA8650-15-C-7556 and DARPA HR0011-16-C-0059","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5635115730","display_name":null,"funder_award_id":"DGE-1500084, CNS-1563848, CNS-1704701 and CRI-1629851","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5648561504","display_name":null,"funder_award_id":"IITP/KEIT[B0101-17-0644]","funder_id":"https://openalex.org/F4320322093","funder_display_name":"Electronics and Telecommunications Research Institute"},{"id":"https://openalex.org/G5718616599","display_name":null,"funder_award_id":"2017R1A6A3A03002506","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G5869452329","display_name":null,"funder_award_id":"B0101-17-0644","funder_id":"https://openalex.org/F4320322093","funder_display_name":"Electronics and Telecommunications Research Institute"},{"id":"https://openalex.org/G60922421","display_name":null,"funder_award_id":"CNS-1563848","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6486092784","display_name":null,"funder_award_id":"FA8650-15-C-7556","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G7182034009","display_name":null,"funder_award_id":"1704701","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8236366147","display_name":"TWC: Medium: Collaborative: Systems, Tools, and Techniques for Executing, Managing, and Securing SGX Programs","funder_award_id":"1563848","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320308737","display_name":"Facebook","ror":"https://ror.org/01zbnvs85"},{"id":"https://openalex.org/F4320322093","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320334879","display_name":"Korea Evaluation Institute of Industrial Technology","ror":"https://ror.org/03z9cwa38"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2769824527.pdf","grobid_xml":"https://content.openalex.org/works/W2769824527.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W597927181","https://openalex.org/W1569778844","https://openalex.org/W1600255172","https://openalex.org/W2074304726","https://openalex.org/W2150620897","https://openalex.org/W2157116240","https://openalex.org/W2163563130","https://openalex.org/W2218490669","https://openalex.org/W2329308213","https://openalex.org/W2367220237","https://openalex.org/W2402811135","https://openalex.org/W2491829854","https://openalex.org/W2505343551","https://openalex.org/W2516668814","https://openalex.org/W2519006453","https://openalex.org/W2532584102","https://openalex.org/W2537014044","https://openalex.org/W2550858797","https://openalex.org/W2575735093","https://openalex.org/W2576037784","https://openalex.org/W2594560662","https://openalex.org/W2606774910","https://openalex.org/W2620979425","https://openalex.org/W2726246108","https://openalex.org/W2727025244","https://openalex.org/W2734361058","https://openalex.org/W2735497888","https://openalex.org/W2751092112","https://openalex.org/W2953150480","https://openalex.org/W2964118667","https://openalex.org/W4295974633"],"related_works":["https://openalex.org/W2883323578","https://openalex.org/W2062201771","https://openalex.org/W2079646460","https://openalex.org/W2795294395","https://openalex.org/W2597534957","https://openalex.org/W2189473744","https://openalex.org/W2562981179","https://openalex.org/W2118422164","https://openalex.org/W2114488210","https://openalex.org/W3102688521"],"abstract_inverted_index":{"Intel":[0],"Software":[1],"Guard":[2],"Extensions":[3],"(SGX)":[4],"provides":[5],"a":[6,16,91,100,105,111,115,126],"strongly":[7],"isolated":[8],"memory":[9,58],"space,":[10],"known":[11],"as":[12],"an":[13,72],"enclave,":[14],"for":[15],"user":[17],"process,":[18],"ensuring":[19],"confidentiality":[20],"and":[21,25,32],"integrity":[22,67,73,80,119],"against":[23,103],"software":[24,112],"hardware":[26,44,107],"attacks.":[27],"Even":[28],"the":[29,36,40,54,76,121],"operating":[30],"system":[31,92],"hypervisor":[33],"cannot":[34],"access":[35],"enclave":[37,55],"because":[38,56,65],"of":[39],"hardware-level":[41],"isolation.":[42],"Further,":[43],"attacks":[45],"are":[46],"neither":[47],"able":[48],"to":[49,85,117],"disclose":[50],"plaintext":[51],"data":[52],"from":[53],"its":[57,66],"is":[59,68,94],"always":[60,69],"encrypted":[61],"nor":[62],"modify":[63],"it":[64,82],"verified":[70],"using":[71],"tree.":[74],"When":[75],"processor":[77,97],"detects":[78],"any":[79],"violation,":[81,120],"locks":[83],"itself":[84],"prevent":[86],"further":[87],"damages;":[88],"that":[89],"is,":[90],"reboot":[93],"necessary.":[95],"The":[96],"lock":[98,122],"seems":[99],"reasonable":[101],"solution":[102],"such":[104],"powerful":[106],"attacker;":[108],"however,":[109],"if":[110],"attacker":[113],"has":[114],"way":[116],"trigger":[118],"could":[123],"result":[124],"in":[125],"severe":[127],"denial-of-service":[128],"(DoS)":[129],"attack.":[130]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":19},{"year":2018,"cited_by_count":13}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2017-12-04T00:00:00"}
