IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business …
In the past few decades, artificial intelligence (AI) technology has experienced swift developments, changing everyone's daily life and profoundly altering the course of human …
Born from a need for a pure “pay-per-use” model and highly scalable platform, the “Serverless” paradigm emerged and has the potential to become a dominant way of building …
L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from low-end embedded …
This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
E Feng, X Lu, D Du, B Yang, X Jiang, Y Xia… - … on Operating Systems …, 2021 - usenix.org
Secure hardware enclaves have been widely used for protecting security-critical applications in the cloud. However, existing enclave designs fail to meet the requirements of …
S Yang, F Zhang, K Huang, X Chen, Y Yang… - arXiv preprint arXiv …, 2022 - arxiv.org
Blockchains offer strong security guarantees, but they cannot protect the ordering of transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can …