Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Scalable memory protection in the {PENGLAI} enclave

E Feng, X Lu, D Du, B Yang, X Jiang, Y Xia… - … on Operating Systems …, 2021 - usenix.org
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …

Adore: Differentially oblivious relational database operators

L Qin, R Jayaram, E Shi, Z Song, D Zhuo… - arXiv preprint arXiv …, 2022 - arxiv.org
There has been a recent effort in applying differential privacy on memory access patterns to
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …

Bringing decentralized search to decentralized services

M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel… - … USENIX} Symposium on …, 2021 - usenix.org
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …

Towards practical oblivious join

Z Chang, D Xie, S Wang, F Li - … of the 2022 International Conference on …, 2022 - dl.acm.org
Many individuals and companies choose the public cloud as their data and IT infrastructure
platform. But remote accesses over the data inevitably bring the issue of trust. Despite strong …

Distributed ledger technology and fully homomorphic encryption: Next-generation information-sharing for supply chain efficiency

DP Hellwig, A Huchzermeier - Innovative Technology at the Interface of …, 2022 - Springer
Abstract Information-sharing facilitates the coordination of supply chains and can be
essential for enterprises' survival. Studies have shown that supply chains benefit from the …

DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation

PC Cheng, K Eykholt, Z Gu, H Jamjoom… - Proceedings of the …, 2024 - dl.acm.org
Federated learning (FL) relies on a central authority to oversee and aggregate model
updates contributed by multiple participating parties in the training process. This …

Data station: delegated, trustworthy, and auditable computation to enable data-sharing consortia with a data escrow

S Xia, Z Zhu, C Zhu, J Zhao, K Chard, AJ Elmore… - arXiv preprint arXiv …, 2023 - arxiv.org
Pooling and sharing data increases and distributes its value. But since data cannot be
revoked once shared, scenarios that require controlled release of data for regulatory …

Accelerating Extra Dimensional Page Walks for Confidential Computing

D Du, B Yang, Y Xia, H Chen - Proceedings of the 56th Annual IEEE …, 2023 - dl.acm.org
To support highly scalable and fine-grained computing paradigms such as microservices
and serverless computing better, modern hardware-assisted confidential computing …

Authenticable data analytics over encrypted data in the cloud

L Chen, Y Mu, L Zeng, F Rezaeibagha… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Statistical analytics on encrypted data requires a fully-homomorphic encryption (FHE)
scheme. However, heavy computation overheads make FHE impractical. In this paper we …