Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

About time: On the challenges of temporal guarantees in untrusted environments

F Alder, G Scopelliti, J Van Bulck… - Proceedings of the 6th …, 2023 - dl.acm.org
Measuring the passage of time and taking actions based on such measurements is a
common security-critical operation that developers often take for granted. When working with …

Survey of control-flow integrity techniques for real-time embedded systems

T Mishra, T Chantem, R Gerdes - ACM Transactions on Embedded …, 2022 - dl.acm.org
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …

CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment

J Jiang, J Qi, T Shen, X Chen, S Zhao… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …

PoTR: Accurate and efficient proof of timely-retrievability for storage systems

C Correia, R Prates, L Fonseca, M Correia… - Formal Aspects of …, 2024 - dl.acm.org
The use of remote storage has become prevalent both by organizations and individuals. By
relying on third-party storage, such as cloud or peer-to-peer storage services, availability …

Aion: Secure Transaction Ordering Using TEEs

P Zarbafian, V Gramoli - European Symposium on Research in Computer …, 2023 - Springer
In state machine replication (SMR), preventing reordering attacks by ensuring a high degree
of fairness when ordering commands requires that clients broadcast their commands to all …

EnclavePoSt: A Practical Proof of Storage‐Time in Cloud via Intel SGX

Y Zhang, W You, S Jia, L Liu, Z Li… - Security and …, 2022 - Wiley Online Library
Data integrity is one of the most critical security concerns for users when using the cloud
storage service. However, it is difficult for users to always stay online and frequently interact …

[PDF][PDF] Low-Latency Privacy-Preserving Access to Edge Storage

C Correia - 2024 - ist.utl.pt
Edge computing is a paradigm that extends cloud computing with storage and processing
capacity close to the user, providing bandwidth savings and lower latencies. This paradigm …

T3E: A Practical Solution to Trusted Time in Secure Enclaves

GM Hamidy, P Philippaerts, W Joosen - International Conference On …, 2023 - Springer
Time is used in secure systems to validate security properties. Consequently, it is vital to
protect the integrity of time information. Intel SGX enables building secure applications …

[PDF][PDF] WIP: Interrupt Attack on TEE-Protected Robotic Vehicles

M Luo, GE Suh - Workshop on Automotive and Autonomous …, 2022 - ndss-symposium.org
Effective coordination of sensor inputs requires correct timestamping of the sensor data for
robotic vehicles. Though the existing trusted execution environment (TEE) can prevent direct …