
Conf on Distributed Applications and Interoperable
Systems, Neuchatel, Switzerland. Springer.
Cond
´
e, R. C. R., Maziero, C. A., and Will, N. C. (2018).
Using Intel SGX to protect authentication credentials
in an untrusted operating system. In Sym on Comput-
ers and Communications, Natal, RN, Brazil. IEEE.
Costan, V. and Devadas, S. (2016). Intel SGX explained.
IACR Cryptology ePrint Archive, 2016:86.
Duan, Y., Cao, Y., and Sun, X. (2015a). Various “aaS” of
Everything as a Service. In Intl Conf on Software En-
gineering, Takamatsu, Japan. IEEE.
Duan, Y., Fu, G., Zhou, N., Sun, X., Narendra, N. C., and
Hu, B. (2015b). Everything as a Service (XaaS) on the
cloud: Origins, current and future trends. In Intl Conf
on Cloud Computing, New York, NY, EUA. IEEE.
Duan, Y., Sun, X., Longo, A., Lin, Z., and Wan, S. (2016).
Sorting terms of “aaS” of everything as a service. Int.
J. Networked Distrib. Comput.
Fisch, B. A., Vinayagamurthy, D., Boneh, D., and Gor-
bunov, S. (2017). Iron: Functional encryption using
Intel SGX. In Conf on Computer and Communica-
tions Security, Dallas, TX, USA. ACM.
Fuhry, B., Bahmani, R., Brasser, F., Hahn, F., Kerschbaum,
F., and Sadeghi, A.-R. (2017). HardIDX: Practical and
secure index with SGX. In Conf on Data and Appli-
cations Security and Privacy, Philadelphia, PA, USA.
Springer.
Karande, V., Bauman, E., Lin, Z., and Khan, L. (2017).
SGX-Log: Securing system logs with SGX. In
Asia Conf on Computer and Communications Secu-
rity, Abu Dhabi, UAE. ACM.
Kim, T., Park, J., Woo, J., Jeon, S., and Huh, J. (2019).
ShieldStore: Shielded in-memory key-value storage
with SGX. In EuroSys Conf, Dresden, Germany.
ACM.
Kircher, M. and Jain, P. (2002). Pooling pattern. In Euro
Conf on Pattern Languages of Programs, Irsee, Ger-
many. UVK.
Krieter, S., Thiem, T., and Leich, T. (2019). Using dynamic
software product lines to implement adaptive SGX-
enabled systems. In Intl Wksp on Variability Mod-
elling of Software-Intensive Systems, Leuven, Bel-
gium. ACM.
Li, D., Lin, R., Tang, L., Liu, H., and Tang, Y. (2019). SGX-
Pool: Improving the performance of enclave creation
in the cloud. Trans. Emerging Telecommun. Technol.
Li, G. and Wei, M. (2014). Everything-as-a-service plat-
form for on-demand virtual enterprises. Inf. Syst.
Front.
McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C. V.,
Shafi, H., Shanbhogue, V., and Savagaonkar, U. R.
(2013). Innovative instructions and software model
for isolated execution. In Intl Wksp on Hardware and
Architectural Support for Security and Privacy, Tel-
Aviv, Israel. ACM.
Mofrad, M. H., Lee, A., and Gray, S. L. (2017). Leverag-
ing Intel SGX to create a nondisclosure cryptographic
library. Preprint arXiv:1705.04706.
Orenbach, M., Lifshits, P., Minkin, M., and Silberstein, M.
(2017). Eleos: Exitless OS services for SGX enclaves.
In Euro Conf on Computer Systems, Belgrade, Serbia.
ACM.
Paoloni, G. (2010). How to benchmark code execution
times on Intel IA-32 and IA-64 instruction set archi-
tectures. Intel Corporation.
Robison, S. (2008). The next wave: Everything as a Ser-
vice. Hewlett-Packard Company.
Sartakov, V. A., Brenner, S., Ben Mokhtar, S., Bouchenak,
S., Thomas, G., and Kapitza, R. (2018). EActors:
Fast and flexible trusted computing using SGX. In
Intl Middleware Conf, Rennes, France. ACM.
Shaon, F., Kantarcioglu, M., Lin, Z., and Khan, L. (2017).
SGX-BigMatrix: A practical encrypted data ana-
lytic framework with trusted processors. In Conf on
Computer and Communications Security, Dallas, TX,
USA. ACM.
Shimizu, A., Townley, D., Joshi, M., and Ponomarev, D.
(2019). EA-PLRU: Enclave-aware cache replacement.
In Intl Wksp on Hardware and Architectural Support
for Security and Privacy, Phoenix, AZ, USA. ACM.
Silva, R., Barbosa, P., and Brito, A. (2017). DynSGX:
A privacy preserving toolset for dinamically load-
ing functions into Intel SGX enclaves. In Intl Conf
on Cloud Computing Technology and Science, Hong
Kong, China. IEEE.
Soriente, C., Karame, G., Li, W., and Fedorov, S. (2019).
ReplicaTEE: Enabling seamless replication of SGX
enclaves in the cloud. In Euro Sym on Security and
Privacy, Stockholm, Sweden. IEEE.
Svenningsson, J., Paladi, N., and Vahidi, A. (2021). Faster
enclave transitions for IO-intensive network applica-
tions. In Wksp on Secure Programmable Network In-
frastructure, Virtual Event. ACM.
Taassori, M., Shafiee, A., and Balasubramonian, R. (2018).
VAULT: Reducing paging overheads in SGX with ef-
ficient integrity verification structures. In Intl Conf
on Architectural Support for Programming Languages
and Operating Systems, Williamsburg, VA, USA.
ACM.
Tang, Y., Li, K., and Chen, J. (2019). Authenticated LSM
trees with minimal trust. In Intl Conf on Security
and Privacy in Communication Systems, Orlando, VA,
USA. Springer.
Tian, H., Zhang, Q., Yan, S., Rudnitsky, A., Shacham, L.,
Yariv, R., and Milshten, N. (2018). Switchless calls
made practical in Intel SGX. In Wksp on System Soft-
ware for Trusted Execution, Toronto, ON, Canada.
ACM.
Weichbrodt, N., Heinemann, J., Almstedt, L., Aublin, P.-
L., and Kapitza, R. (2021). sgx-dl: Dynamic loading
and hot-patching for secure applications: Experience
paper. In Intl Middleware Conf, Qu
´
ebec City, QC,
Canada. ACM.
Weisse, O., Bertacco, V., and Austin, T. (2017). Regaining
lost cycles with HotCalls: A fast interface for SGX se-
cure enclaves. In Intl Sym on Computer Architecture,
Toronto, ON, Canada. ACM.
Will, N. C. and Maziero, C. A. (2020). Using a shared SGX
enclave in the UNIX PAM authentication service. In
Intl Systems Conf, Montreal, QC, Canada. IEEE.
Enclave Management Models for Safe Execution of Software Components
485