Smashex: Smashing sgx enclaves using exceptions

J Cui, JZ Yu, S Shinde, P Saxena, Z Cai - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Exceptions are a commodity hardware functionality which is central to multi-tasking OSes as
well as event-driven user applications. Normally, the OS assists the user application by …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

Modern Hardware Security: A Review of Attacks and Countermeasures

J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …

{SGXFuzz}: Efficiently synthesizing nested structures for {SGX} enclave fuzzing

T Cloosters, J Willbold, T Holz, L Davi - 31st USENIX Security …, 2022 - usenix.org
Intel's Software Guard Extensions (SGX) provide a nonintrospectable trusted execution
environment (TEE) to protect security-critical code from a potentially malicious OS. This …

Fuzzing sgx enclaves via host program mutations

A Khan, M Zou, K Kim, D Xu, A Bianchi… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …

{HyperEnclave}: An open and cross-platform trusted execution environment

Y Jia, S Liu, W Wang, Y Chen, Z Zhai, S Yan… - 2022 USENIX Annual …, 2022 - usenix.org
A number of trusted execution environments (TEEs) have been proposed by both academia
and industry. However, most of them require specific hardware or firmware changes and are …

On security of trustzone-m-based iot systems

L Luo, Y Zhang, C White, B Keating… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been increasingly integrated into our daily life.
However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the …

Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution

Y Wang, Z Zhang, N He, Z Zhong, S Guo… - Proceedings of the …, 2023 - dl.acm.org
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …

Controlled data races in enclaves: Attacks and detection

S Chen, Z Lin, Y Zhang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
This paper introduces controlled data race attacks, a new class of attacks against programs
guarded by trusted execution environments such as Intel SGX. Controlled data race attacks …

Flare: A fast, secure, and memory-efficient distributed analytics framework

X Li, F Li, M Gao - Proceedings of the VLDB Endowment, 2023 - dl.acm.org
As big data processing in the cloud becomes prevalent today, data privacy on such public
platforms raises critical concerns. Hardware-based trusted execution environments (TEEs) …