A survey of Intel SGX and its applications
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
Trusted execution environments: Applications and organizational challenges
T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022 - frontiersin.org
A lack of trust in the providers is still a major barrier to cloud computing adoption–especially
when sensitive data is involved. While current privacy-enhancing technologies, such as …
when sensitive data is involved. While current privacy-enhancing technologies, such as …
Teechain: a secure payment network with asynchronous blockchain access
Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their
performance is limited by the need for global consensus. Payment networks overcome this …
performance is limited by the need for global consensus. Payment networks overcome this …
Iron: functional encryption using Intel SGX
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Cyber security has recently garnered enormous attention due to the popularity of the Internet
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …
A formal foundation for secure remote execution of enclaves
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …
processor, offer compelling security features but lack formal guarantees. We introduce a …
Mlcapsule: Guarded offline deployment of machine learning as a service
Abstract Machine Learning as a Service (MLaaS) is a popular and convenient way to access
a trained machine learning (ML) model trough an API. However, if the user's input is …
a trained machine learning (ML) model trough an API. However, if the user's input is …
Formal abstractions for attested execution secure processors
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
{SAPIC+}: protocol verifiers of the world, unite!
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …
Today, experts can model real-world protocols, but this often requires model-specific …
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension,
aim to provide strong confidentiality and integrity assurances for applications. Recent work …
aim to provide strong confidentiality and integrity assurances for applications. Recent work …