TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models

D Li, Z Zhang, M Yao, Y Cai, Y Guo… - ACM Transactions on …, 2024 - dl.acm.org
Trusted Execution Environments (TEE) are used to safeguard on-device models. However,
directly employing TEEs to secure the entire DNN model is challenging due to the limited …

Trusted execution environment instances licenses management

A Maximov, B Smeets, L Pålsson - US Patent 11,416,605, 2022 - Google Patents
There is provided mechanisms for handling instances of a trusted execution environment on
an execution platform. The trusted execution environment is associated with a secure …

IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems

A Atamli, G Petracca, J Crowcroft - Proceedings of the 14th International …, 2019 - dl.acm.org
Modern malware is complex, stealthy, and employ anti-forensics techniques to evade
detection. In order to detect malware, data must be collected, such, allows further analyses …

Instance handling of a trusted execution environment

A Maximov, B Smeets, L Pålsson - US Patent 11,704,442, 2023 - Google Patents
There is provided mechanisms for handling instances of a trusted execution environment on
an execution platform. The trusted execution environment is associated with a secure …

On Differential Privacy for Language Models

S Arnold - 2023 - search.proquest.com
Abstract Language Models (LM), trained to assign a probability distribution over sequences
of words, offer tremendous opportunities for automating a wide range of tasks that involve …

[PDF][PDF] Security with intel SGX: Enhancements, applications and privacy

S Matetic - 2018 - research-collection.ethz.ch
With the ever growing development of Internet, security has become a crucial topic for both
the application developers and end users. A popular approach in achieving security is …

Concealed monitor communications from a task in a trusted execution environment

MHM Bursell - US Patent 11,297,100, 2022 - Google Patents
the examples relate to concealed monitor communications from a task in a trusted execution
environment (TEE). If a task in a TEE determines that an abnormal condition exists, such as …

Enclave handling on an execution platform

L Palsson, A Mehes, B Smeets - US Patent 11,416,604, 2022 - Google Patents
There are provided mechanisms for handling instances of enclaves on an execution
platform. The execution platform comprises a secure component. The secure component …

Monitoring a process in a trusted execution environment to identify a resource starvation attack

MHM Bursell - US Patent 11,263,318, 2022 - Google Patents
Monitoring a process in a trusted execution environment (TEE) to identify a resource
starvation attack. A first monitor executing outside of a first TEE determines that a first …

Management of SSL Certificates: Through Dynamic Link Libraries

J Vargas, F Mayorga, D Guevara… - Technology Trends: 4th …, 2019 - Springer
This article describes the process of creating a dynamic-link library for SSL certificate
management. The use of these libraries is usually between client-server, for communication …