SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution

Y Wang, Z Zhang, N He, Z Zhong, S Guo… - Proceedings of the …, 2023 - dl.acm.org
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …

Public verification for private hash matching

S Scheffler, A Kulshrestha… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) prevents online services from accessing user content. This
important security property is also an obstacle for content moderation methods that involve …

Golden grain: Building a secure and decentralized model marketplace for MLaaS

J Weng, J Weng, C Cai, H Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of
people. A natural requirement for MLaaS is, however, to provide highly accurate prediction …

A Comprehensive Trusted Runtime for WebAssembly with Intel SGX

J Ménétrey, M Pasin, P Felber… - … on Dependable and …, 2023 - ieeexplore.ieee.org
In real-world scenarios, trusted execution environments (TEEs) frequently host applications
that lack the trust of the infrastructure provider, as well as data owners who have specifically …

Disposable identities: Solving web tracking

JB Abdo, S Zeadally - Journal of Information Security and Applications, 2024 - Elsevier
Interrupting the web tracking kill chain is enough to disrupt the tracker's ability to leverage
the collected information; however, this may disrupt the personalized services enjoyed by …

Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis

Y Chen, J Jiang, S Yan, H Xu - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
Intel SGX is a promising TEE technique that can protect programs running in user space
from being maliciously accessed by the host operating system. Although it provides …

A verified confidential computing as a service framework for privacy preservation

H Chen, HH Chen, M Sun, K Li, Z Chen… - 32nd USENIX Security …, 2023 - usenix.org
As service providers are moving to the cloud, users are forced to provision sensitive data to
the cloud. Confidential computing leverages hardware Trusted Execution Environment …

Understanding TEE containers, easy to use? Hard to trust

W Liu, H Chen, XF Wang, Z Li, D Zhang… - arXiv preprint arXiv …, 2021 - arxiv.org
As an emerging technique for confidential computing, trusted execution environment (TEE)
receives a lot of attention. To better develop, deploy, and run secure applications on a TEE …

STELLA: sparse taint analysis for enclave leakage detection

Y Chen, J Jiang, S Yan, H Xu - arXiv preprint arXiv:2208.04719, 2022 - arxiv.org
Intel SGX (Software Guard Extension) is a promising TEE (trusted execution environment)
technique that can protect programs running in user space from being maliciously accessed …