Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution

Y Wang, Z Zhang, N He, Z Zhong, S Guo… - Proceedings of the …, 2023 - dl.acm.org
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …

BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation

Z Zhang, W You, G Tao, G Wei, Y Kwon… - Proceedings of the ACM …, 2019 - dl.acm.org
Binary program dependence analysis determines dependence between instructions and
hence is important for many applications that have to deal with executables without any …

ADAM-CS: Advanced asynchronous monotonic counter service

A Martin, C Lian, F Gregor, R Krahn… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Trusted execution environments (TEEs) offer the technological breakthrough to allow
several applications to be deployed and executed over untrusted public cloud environments …

Securing the storage data path with SGX enclaves

D Harnik, E Tsfadia, D Chen, R Kat - arXiv preprint arXiv:1806.10883, 2018 - arxiv.org
We explore the use of SGX enclaves as a means to improve the security of handling keys
and data in storage systems. We study two main configurations for SGX computations, as …

A verified confidential computing as a service framework for privacy preservation

H Chen, HH Chen, M Sun, K Li, Z Chen… - 32nd USENIX Security …, 2023 - usenix.org
As service providers are moving to the cloud, users are forced to provision sensitive data to
the cloud. Confidential computing leverages hardware Trusted Execution Environment …

Compiler-aided development of trusted enclaves with rust

F Dreissig, J Röckl, T Müller - … of the 17th International Conference on …, 2022 - dl.acm.org
To optimally utilize Intel SGX, programs must be partitioned into trusted and untrusted parts.
Writing the trusted part of a program with Intel's SDK, however, requires manual effort that …

Building and maintaining a third-party library supply chain for productive and secure SGX enclave development

P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou… - Proceedings of the …, 2020 - dl.acm.org
The big data industry is facing new challenges as concerns about privacy leakage soar. One
of the remedies to privacy breach incidents is to encapsulate computations over sensitive …

SRX–secure data backup and recovery for SGX applications

D Andrade, J Silva, M Correia - IEEE Access, 2022 - ieeexplore.ieee.org
Intel SGX improves the security of applications by shielding code and data from untrusted
software in enclaves. Since enclaves lose their state when closed, that state has to be …