{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:50:51Z","timestamp":1745387451720,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/netsoft.2019.8806681","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T23:44:37Z","timestamp":1566517477000},"page":"19-23","source":"Crossref","is-referenced-by-count":7,"title":["Towards protected VNFs for multi-operator service delivery"],"prefix":"10.1109","author":[{"given":"Enio","family":"Marku","sequence":"first","affiliation":[]},{"given":"Gergely","family":"Biczok","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876032"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3040994"},{"key":"ref12","first-page":"201","article-title":"Safebricks: Shielding network functions in the cloud","author":"poddar","year":"2018","journal-title":"USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106994"},{"key":"ref14","first-page":"x","article-title":"Shieldbox: Secure middleboxes using shielded execution","author":"trach","year":"2018","journal-title":"Symposium on SDN Research SOSR 2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref16","first-page":"489","article-title":"mTCP: a highly scalable user-level TCP stack for multicore systems","author":"jeong","year":"2014","journal-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation NSDI 2014"},{"journal-title":"Data-Plane Development Kit","year":"0","key":"ref17"},{"key":"ref18","first-page":"101","article-title":"netmap: A novel framework for fast packet I\/O","author":"rizzo","year":"2012","journal-title":"2012 USENIX Conference on Annual Technical Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267831"},{"key":"ref28","article-title":"Intel SGX explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref27","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","author":"bulck","year":"2017","journal-title":"26th USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502996"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2753044"},{"key":"ref29","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","author":"bulck","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940150"},{"key":"ref7","first-page":"255","article-title":"Embark: Securely outsourcing middleboxes to the cloud","author":"lan","year":"2016","journal-title":"13th USENIX Symposium on Networked Systems Design and Implementation NSDI 2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600197"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524526"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"ref20","first-page":"203","article-title":"NetBricks: Taking the V out of NFV","author":"panda","year":"2016","journal-title":"USENIX Symp on Operating Systems Design & Implementation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"ref21","first-page":"1","article-title":"FLICK: developing and running application-specific network services","author":"alim","year":"2016","journal-title":"USENIX Annual Technical Conference"},{"journal-title":"Cache timing attacks","year":"2011","author":"banescu","key":"ref24"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/2678373.2665726","article-title":"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors","author":"kim","year":"2014","journal-title":"41st International Symposium on Computer Architecture"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref25","article-title":"Software grand exposure: SGX cache attacks are practical","author":"brasser","year":"2017","journal-title":"11th USENIX Workshop on Offensive Technologies WOOT"}],"event":{"name":"2019 IEEE Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2019,6,24]]},"location":"Paris, France","end":{"date-parts":[[2019,6,28]]}},"container-title":["2019 IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8792325\/8806619\/08806681.pdf?arnumber=8806681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:22:26Z","timestamp":1658157746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8806681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2019.8806681","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}