When federated learning meets privacy-preserving computation

J Chen, H Yan, Z Liu, M Zhang, H Xiong… - ACM Computing Surveys, 2024 - dl.acm.org
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide
attention from society and individuals. It is desirable to make the data available but invisible …

Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

Trustworthy ai: A computational perspective

H Liu, Y Wang, W Fan, X Liu, Y Li, S Jain, Y Liu… - ACM Transactions on …, 2022 - dl.acm.org
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …

Serverless edge computing: vision and challenges

MS Aslanpour, AN Toosi, C Cicconetti… - Proceedings of the …, 2021 - dl.acm.org
Born from a need for a pure “pay-per-use” model and highly scalable platform, the
“Serverless” paradigm emerged and has the potential to become a dominant way of building …

[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks

L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …

Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems

D Cerdeira, N Santos, P Fonseca… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …

{CURE}: A security architecture with {CUstomizable} and resilient enclaves

R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …

A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes

J Van Bulck, D Oswald, E Marin, A Aldoseri… - Proceedings of the …, 2019 - dl.acm.org
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …

Scalable memory protection in the {PENGLAI} enclave

E Feng, X Lu, D Du, B Yang, X Jiang, Y Xia… - … on Operating Systems …, 2021 - usenix.org
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …

Sok: Mev countermeasures: Theory and practice

S Yang, F Zhang, K Huang, X Chen, Y Yang… - arXiv preprint arXiv …, 2022 - arxiv.org
Blockchains offer strong security guarantees, but they cannot protect the ordering of
transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can …