Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Chex-mix: Combining homomorphic encryption with trusted execution environments for two-party oblivious inference in the cloud

D Natarajan, A Loveless, W Dai… - Cryptology ePrint …, 2021 - eprint.iacr.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …

DDQN-TS: A novel bi-objective intelligent scheduling algorithm in the cloud environment

Z Tong, F Ye, B Liu, J Cai, J Mei - Neurocomputing, 2021 - Elsevier
Task scheduling has always been one of the crucial problem in cloud computing. With the
transition of task types from static batch processing to dynamic stream processing, the …

Secure attack detection framework for hierarchical 6G-enabled internet of vehicles

H Sedjelmaci, N Kaaniche… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Sixth Generation Heterogeneous Network (6G HetNet) is a global interconnected
system that serves a myriad variety of applications and services across multiple domains …

A mutation-enabled proactive defense against service-oriented man-in-the-middle attack in kubernetes

T Ma, C Xu, S Yang, Y Huang, Q An… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Kubernetes (K8s) has become a core technology for cloud-native applications. However, a
design flaw of the external IP in K8s leads to the service-oriented man-in-the-middle attack …

Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis

Y Chen, J Jiang, S Yan, H Xu - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
Intel SGX is a promising TEE technique that can protect programs running in user space
from being maliciously accessed by the host operating system. Although it provides …

Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data

J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …

[HTML][HTML] HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE

Q Wang, L Zhou, J Bai, YS Koh, S Cui, G Russello - Computers & Security, 2023 - Elsevier
Abstract Outsourcing Machine Learning (ML) tasks to cloud servers is a cost-effective
solution when dealing with distributed data. However, outsourcing these tasks to cloud …

vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

Q Lou, M Santriaji, AWB Yudha, J Xue… - arXiv preprint arXiv …, 2023 - arxiv.org
Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for
computation to be performed on ciphertext without the need for decryption. FHE will thus …

CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud

D Natarajan, A Loveless, W Dai… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …