Securetf: A secure tensorflow framework
DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
Cubicleos: A library os with software componentisation for practical isolation
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or
trusted execution environments. They often follow a highly modular design in which third …
trusted execution environments. They often follow a highly modular design in which third …
Dissecting bft consensus: In trusted components we trust!
The growing interest in reliable multi-party applications has fostered widespread adoption of
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …
Spotless: Concurrent rotational consensus made practical through rapid view synchronization
The emergence of blockchain technology has renewed the interest in consensus-based
data management systems that are resilient to failures. To maximize the throughput of these …
data management systems that are resilient to failures. To maximize the throughput of these …
Trustav: Practical and privacy preserving malware analysis in the cloud
While the number of connected devices is constantly growing, we observe an increased
incident rate of cyber attacks that target user data. Typically, personal devices contain the …
incident rate of cyber attacks that target user data. Typically, personal devices contain the …
EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …
for many systems to improve throughput and reduce latency, cloud caches have been widely …
Spons & Shields: practical isolation for trusted execution
Trusted execution environments (TEEs) promise a cost-effective,“lift-and-shift” solution for
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …
HotStuff-1: Linear Consensus with One-Phase Speculation
This paper introduces HotStuff-1, a BFT consensus protocol that improves the latency of
HotStuff-2 by two network-hops while maintaining linear communication complexity against …
HotStuff-2 by two network-hops while maintaining linear communication complexity against …
DCert: towards secure, efficient, and versatile blockchain light clients
Light clients have been widely used in blockchain systems to support lightweight nodes by
synchronizing and verifying block headers only. However, there are two major limitations …
synchronizing and verifying block headers only. However, there are two major limitations …
SRX–secure data backup and recovery for SGX applications
Intel SGX improves the security of applications by shielding code and data from untrusted
software in enclaves. Since enclaves lose their state when closed, that state has to be …
software in enclaves. Since enclaves lose their state when closed, that state has to be …