Securetf: A secure tensorflow framework

DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …

Cubicleos: A library os with software componentisation for practical isolation

VA Sartakov, L Vilanova, P Pietzuch - Proceedings of the 26th ACM …, 2021 - dl.acm.org
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or
trusted execution environments. They often follow a highly modular design in which third …

Dissecting bft consensus: In trusted components we trust!

S Gupta, S Rahnama, S Pandey, N Crooks… - Proceedings of the …, 2023 - dl.acm.org
The growing interest in reliable multi-party applications has fostered widespread adoption of
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …

Spotless: Concurrent rotational consensus made practical through rapid view synchronization

D Kang, S Rahnama, J Hellings… - 2024 IEEE 40th …, 2024 - ieeexplore.ieee.org
The emergence of blockchain technology has renewed the interest in consensus-based
data management systems that are resilient to failures. To maximize the throughput of these …

Trustav: Practical and privacy preserving malware analysis in the cloud

D Deyannis, E Papadogiannaki… - Proceedings of the …, 2020 - dl.acm.org
While the number of connected devices is constantly growing, we observe an increased
incident rate of cyber attacks that target user data. Typically, personal devices contain the …

EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX

L Chen, J Li, R Ma, H Guan, HA Jacobsen - Proceedings of the 20th …, 2019 - dl.acm.org
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …

Spons & Shields: practical isolation for trusted execution

VA Sartakov, D O'Keeffe, D Eyers, L Vilanova… - Proceedings of the 17th …, 2021 - dl.acm.org
Trusted execution environments (TEEs) promise a cost-effective,“lift-and-shift” solution for
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …

HotStuff-1: Linear Consensus with One-Phase Speculation

D Kang, S Gupta, D Malkhi, M Sadoghi - arxiv preprint arxiv:2408.04728, 2024 - arxiv.org
This paper introduces HotStuff-1, a BFT consensus protocol that improves the latency of
HotStuff-2 by two network-hops while maintaining linear communication complexity against …

DCert: towards secure, efficient, and versatile blockchain light clients

Y Ji, C Xu, C Zhang, J Xu - Proceedings of the 23rd ACM/IFIP …, 2022 - dl.acm.org
Light clients have been widely used in blockchain systems to support lightweight nodes by
synchronizing and verifying block headers only. However, there are two major limitations …

SRX–secure data backup and recovery for SGX applications

D Andrade, J Silva, M Correia - IEEE Access, 2022 - ieeexplore.ieee.org
Intel SGX improves the security of applications by shielding code and data from untrusted
software in enclaves. Since enclaves lose their state when closed, that state has to be …