{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}

CC Tsai, DE Porter, M Vij - 2017 USENIX Annual Technical Conference …, 2017 - usenix.org
Intel SGX hardware enables applications to protect themselves from potentially-malicious
OSes or hypervisors. In cloud computing and other systems, many users and applications …

Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017 - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Heterogeneous isolated execution for commodity gpus

I Jang, A Tang, T Kim, S Sethumadhavan… - Proceedings of the …, 2019 - dl.acm.org
Traditional CPUs and cloud systems based on them have embraced the hardware-based
trusted execution environments to securely isolate computation from malicious OS or …

{SafeBricks}: shielding network functions in the cloud

R Poddar, C Lan, RA Popa, S Ratnasamy - 15th USENIX Symposium on …, 2018 - usenix.org
With the advent of network function virtualization (NFV), outsourcing network processing to
the cloud is growing in popularity amongst enterprises and organizations. Such outsourcing …

Shieldbox: Secure middleboxes using shielded execution

B Trach, A Krohmer, F Gregor, S Arnautov… - Proceedings of the …, 2018 - dl.acm.org
Middleboxes that process confidential data cannot be securely deployed in untrusted cloud
environments. To securely outsource middleboxes to the cloud, state-of-the-art systems …

Engraft: Enclave-guarded Raft on Byzantine faulty nodes

W Wang, S Deng, J Niu, MK Reiter… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …

Custos: Practical tamper-evident auditing of operating systems using trusted execution

R Paccagnella, P Datta, WU Hassan, A Bates… - Network and distributed …, 2020 - par.nsf.gov
System auditing is a central concern when investigating and responding to security
incidents. Unfortunately, attackers regularly engage in anti-forensic activities after a break-in …

SoK: TEE-assisted confidential smart contract

R Li, Q Wang, Q Wang, D Galindo, M Ryan - arXiv preprint arXiv …, 2022 - arxiv.org
The blockchain-based smart contract lacks privacy since the contract state and instruction
code are exposed to the public. Combining smart-contract execution with Trusted Execution …