Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017 - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017 - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

Game of threads: Enabling asynchronous poisoning attacks

JR Sanchez Vicarte, B Schreiber… - Proceedings of the …, 2020 - dl.acm.org
As data sizes continue to grow at an unprecedented rate, machine learning training is being
forced to adopt asynchronous algorithms to maintain performance and scalability. In …

{PRIDWEN}: Universally Hardening {SGX} Programs via {Load-Time} Synthesis

F Sang, MW Shih, S Lee, X Zhang, M Steiner… - 2022 USENIX Annual …, 2022 - usenix.org
A growing class of threats to Intel Software Guard Extensions (SGX) is Side-Channel Attacks
(SCAs). As a response, numerous countermeasures have been proposed. However, it is …

Finding and exploiting faults in hardware and software

K Murdock - 2023 - etheses.bham.ac.uk
Computers are constantly being enhanced to improve their speed, size, security, and energy
consumption. Dynamic Voltage and Frequency Scaling (DVFS) improves energy efficiency …

[PDF][PDF] Hardening and Adapting Trusted Execution Environments for Emerging Platforms

F Sang - 2024 - gts3.org
HARDENING AND ADAPTING TRUSTED EXECUTION ENVIRONMENTS FOR EMERGING
PLATFORMS A Dissertation Presented to The Academic Faculty By Page 1 HARDENING AND …

A provable security treatment of isolated execution environments and applications to secure computation

BLF Portela - 2018 - search.proquest.com
Exciting new capabilities of modern trusted hardware technologies allow for the execution of
arbitrary code within environments isolated from the rest of the system and provide …