Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

Benchmarking the second generation of intel sgx hardware

M El-Hindi, T Ziegler, M Heinrich, A Lutsch… - Proceedings of the 18th …, 2022 - dl.acm.org
In recent years, trusted execution environments (TEEs) such as Intel Software Guard
Extensions (SGX) have gained a lot of attention in the database community. This is because …

Everything you should know about Intel SGX performance on virtualized systems

T Dinh Ngoc, B Bui, S Bitchebe, A Tchana… - Proceedings of the …, 2019 - dl.acm.org
Intel SGX has attracted much attention from academia and is already powering commercial
applications. Cloud providers have also started implementing SGX in their cloud offerings …

DeepAttest: An end-to-end attestation framework for deep neural networks

H Chen, C Fu, BD Rouhani, J Zhao… - Proceedings of the 46th …, 2019 - dl.acm.org
Emerging hardware architectures for Deep Neural Networks (DNNs) are being
commercialized and considered as the hardware-level Intellectual Property (IP) of the device …

Secure and lightweight deduplicated storage via shielded {deduplication-before-encryption}

Z Yang, J Li, PPC Lee - … Annual Technical Conference (USENIX ATC 22), 2022 - usenix.org
Outsourced storage should fulfill confidentiality and storage efficiency for large-scale data
management. Conventional approaches often combine encryption and deduplication based …

Accelerating encrypted deduplication via {SGX}

Y Ren, J Li, Z Yang, PPC Lee, X Zhang - 2021 USENIX Annual Technical …, 2021 - usenix.org
Encrypted deduplication preserves the deduplication effectiveness on encrypted data and is
attractive for outsourced storage. However, existing encrypted deduplication approaches …

Secure and private function evaluation with Intel SGX

S Felsen, Á Kiss, T Schneider, C Weinert - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Secure function evaluation (SFE) allows two parties to jointly evaluate a publicly known
function without revealing their respective inputs. SFE can be realized via well-known …

Exploit: Extracting private labels in split learning

S Kariyappa, MK Qureshi - 2023 IEEE conference on secure …, 2023 - ieeexplore.ieee.org
Split learning is a popular technique used to perform vertical federated learning, where the
goal is to jointly train a model on the private input and label data held by two parties. To …

Research on data routing strategy of deduplication in cloud environment

Q He, F Zhang, G Bian, W Zhang, D Duan, Z Li… - IEEE …, 2021 - ieeexplore.ieee.org
The application of data deduplication technology reduces the demand for data storage and
improves resource utilization. Compared with limited storage capacity and computing …

A tale of two trees: one writes, and other reads

DV Le, LT Hurtado, A Ahmad, M Minaei… - … on Privacy Enhancing …, 2020 - petsymposium.org
The Bitcoin network has offered a new way of securely performing financial transactions
over the insecure network. Nevertheless, this ability comes with the cost of storing a large …