Security vulnerabilities of SGX and countermeasures: A survey

S Fei, Z Yan, W Ding, H Xie - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …

Intel tdx demystified: A top-down approach

PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu… - ACM Computing …, 2024 - dl.acm.org
Intel Trust Domain Extensions (TDX) is an architectural extension in the 4th Generation Intel
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution

J Van Bulck, M Minkin, O Weisse, D Genkin… - 27th USENIX Security …, 2018 - usenix.org
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …

ZombieLoad: Cross-privilege-boundary data sampling

M Schwarz, M Lipp, D Moghimi, J Van Bulck… - Proceedings of the …, 2019 - dl.acm.org
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …

LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

Privacy preserving vertical federated learning for tree-based models

Y Wu, S Cai, X Xiao, G Chen, BC Ooi - arXiv preprint arXiv:2008.06170, 2020 - arxiv.org
Federated learning (FL) is an emerging paradigm that enables multiple organizations to
jointly train a model without revealing their private data to each other. This paper studies {\it …