A survey of Intel SGX and its applications

W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo… - Frontiers of Computer …, 2021 - Springer
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …

Trusted execution environments: Applications and organizational challenges

T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022 - frontiersin.org
A lack of trust in the providers is still a major barrier to cloud computing adoption–especially
when sensitive data is involved. While current privacy-enhancing technologies, such as …

Teechain: a secure payment network with asynchronous blockchain access

J Lind, O Naor, I Eyal, F Kelbert, EG Sirer… - Proceedings of the 27th …, 2019 - dl.acm.org
Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their
performance is limited by the need for global consensus. Payment networks overcome this …

Iron: functional encryption using Intel SGX

B Fisch, D Vinayagamurthy, D Boneh… - Proceedings of the 2017 …, 2017 - dl.acm.org
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …

An intelligent DDoS attack detection tree-based model using Gini index feature selection method

MA Bouke, A Abdullah, SH ALshatebi… - Microprocessors and …, 2023 - Elsevier
Cyber security has recently garnered enormous attention due to the popularity of the Internet
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …

A formal foundation for secure remote execution of enclaves

P Subramanyan, R Sinha, I Lebedev… - Proceedings of the …, 2017 - dl.acm.org
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …

Mlcapsule: Guarded offline deployment of machine learning as a service

L Hanzlik, Y Zhang, K Grosse… - Proceedings of the …, 2021 - openaccess.thecvf.com
Abstract Machine Learning as a Service (MLaaS) is a popular and convenient way to access
a trained machine learning (ML) model trough an API. However, if the user's input is …

Formal abstractions for attested execution secure processors

R Pass, E Shi, F Tramer - … in Cryptology–EUROCRYPT 2017: 36th Annual …, 2017 - Springer
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …

{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge

F Tramer, F Zhang, H Lin, JP Hubaux… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension,
aim to provide strong confidentiality and integrity assurances for applications. Recent work …