TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Trusted Execution Environments (TEE) are used to safeguard on-device models. However,
directly employing TEEs to secure the entire DNN model is challenging due to the limited …
directly employing TEEs to secure the entire DNN model is challenging due to the limited …
Trusted execution environment instances licenses management
A Maximov, B Smeets, L Pålsson - US Patent 11,416,605, 2022 - Google Patents
There is provided mechanisms for handling instances of a trusted execution environment on
an execution platform. The trusted execution environment is associated with a secure …
an execution platform. The trusted execution environment is associated with a secure …
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
Modern malware is complex, stealthy, and employ anti-forensics techniques to evade
detection. In order to detect malware, data must be collected, such, allows further analyses …
detection. In order to detect malware, data must be collected, such, allows further analyses …
Instance handling of a trusted execution environment
A Maximov, B Smeets, L Pålsson - US Patent 11,704,442, 2023 - Google Patents
There is provided mechanisms for handling instances of a trusted execution environment on
an execution platform. The trusted execution environment is associated with a secure …
an execution platform. The trusted execution environment is associated with a secure …
On Differential Privacy for Language Models
S Arnold - 2023 - search.proquest.com
Abstract Language Models (LM), trained to assign a probability distribution over sequences
of words, offer tremendous opportunities for automating a wide range of tasks that involve …
of words, offer tremendous opportunities for automating a wide range of tasks that involve …
[PDF][PDF] Security with intel SGX: Enhancements, applications and privacy
S Matetic - 2018 - research-collection.ethz.ch
With the ever growing development of Internet, security has become a crucial topic for both
the application developers and end users. A popular approach in achieving security is …
the application developers and end users. A popular approach in achieving security is …
Concealed monitor communications from a task in a trusted execution environment
MHM Bursell - US Patent 11,297,100, 2022 - Google Patents
the examples relate to concealed monitor communications from a task in a trusted execution
environment (TEE). If a task in a TEE determines that an abnormal condition exists, such as …
environment (TEE). If a task in a TEE determines that an abnormal condition exists, such as …
Enclave handling on an execution platform
L Palsson, A Mehes, B Smeets - US Patent 11,416,604, 2022 - Google Patents
There are provided mechanisms for handling instances of enclaves on an execution
platform. The execution platform comprises a secure component. The secure component …
platform. The execution platform comprises a secure component. The secure component …
Monitoring a process in a trusted execution environment to identify a resource starvation attack
MHM Bursell - US Patent 11,263,318, 2022 - Google Patents
Monitoring a process in a trusted execution environment (TEE) to identify a resource
starvation attack. A first monitor executing outside of a first TEE determines that a first …
starvation attack. A first monitor executing outside of a first TEE determines that a first …
Management of SSL Certificates: Through Dynamic Link Libraries
This article describes the process of creating a dynamic-link library for SSL certificate
management. The use of these libraries is usually between client-server, for communication …
management. The use of these libraries is usually between client-server, for communication …