{"id":"https://openalex.org/W6888046241","doi":"https://doi.org/10.18420/btw2023-44","title":"Benchmarking the Second Generation of Intel SGX for Machine Learning Workloads","display_name":"Benchmarking the Second Generation of Intel SGX for Machine Learning Workloads","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W6888046241","doi":"https://doi.org/10.18420/btw2023-44"},"language":"en","primary_location":{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:138776","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Konferenzver\u00f6ffentlichung"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/btw2023-44","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Lutsch, Adrian","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lutsch, Adrian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Singh, Gagandeep","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Singh, Gagandeep","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Mundt, Martin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mundt, Martin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Mogk, Ragnar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mogk, Ragnar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Binnig, Carsten","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Binnig, Carsten","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25220906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.017999999225139618,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.01590000092983246,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.7325000166893005},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.33410000801086426},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.30149999260902405},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.27149999141693115}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965999841690063},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.7325000166893005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.503000020980835},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4659999907016754},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46140000224113464},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.33410000801086426},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.30149999260902405},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2922999858856201},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:138776","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Konferenzver\u00f6ffentlichung"},{"id":"doi:10.18420/btw2023-44","is_oa":true,"landing_page_url":"https://doi.org/10.18420/btw2023-44","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/btw2023-44","is_oa":true,"landing_page_url":"https://doi.org/10.18420/btw2023-44","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"For":[0],"domains":[1],"with":[2],"high":[3,44],"data":[4],"privacy":[5],"and":[6,13,58,81],"protection":[7],"demands,":[8],"such":[9],"as":[10],"health":[11],"care":[12],"finance,":[14],"outsourcing":[15],"machine":[16],"learning":[17],"tasks":[18],"often":[19],"requires":[20],"additional":[21,37],"security":[22],"measures.":[23],"Trusted":[24],"Execution":[25],"Environments":[26],"like":[27],"Intel":[28,41,66],"SGX":[29,42,80],"are":[30],"a":[31,86],"powerful":[32],"tool":[33],"to":[34],"achieve":[35],"this":[36],"security.":[38],"Until":[39],"recently,":[40],"incurred":[43],"performance":[45,87],"costs,":[46],"mainly":[47],"because":[48],"it":[49],"was":[50],"severely":[51],"limited":[52],"in":[53],"terms":[54],"of":[55,64,85],"available":[56],"memory":[57],"CPUs.":[59],"With":[60],"the":[61],"second":[62],"generation":[63],"SGX,":[65],"alleviates":[67],"these":[68],"problems.":[69],"Therefore,":[70],"we":[71],"revisit":[72],"previous":[73],"use":[74],"cases":[75],"for":[76,89],"ML":[77,90],"secured":[78],"by":[79],"show":[82],"initial":[83],"results":[84],"study":[88],"workloads":[91],"on":[92],"SGXv2.":[93]},"counts_by_year":[],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
