Smashex: Smashing sgx enclaves using exceptions
Exceptions are a commodity hardware functionality which is central to multi-tasking OSes as
well as event-driven user applications. Normally, the OS assists the user application by …
well as event-driven user applications. Normally, the OS assists the user application by …
Machine learning with confidential computing: A systematization of knowledge
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …
severe, along with ML's pervasive development and the recent demonstration of large attack …
Modern Hardware Security: A Review of Attacks and Countermeasures
J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
{SGXFuzz}: Efficiently synthesizing nested structures for {SGX} enclave fuzzing
Intel's Software Guard Extensions (SGX) provide a nonintrospectable trusted execution
environment (TEE) to protect security-critical code from a potentially malicious OS. This …
environment (TEE) to protect security-critical code from a potentially malicious OS. This …
Fuzzing sgx enclaves via host program mutations
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …
{HyperEnclave}: An open and cross-platform trusted execution environment
A number of trusted execution environments (TEEs) have been proposed by both academia
and industry. However, most of them require specific hardware or firmware changes and are …
and industry. However, most of them require specific hardware or firmware changes and are …
On security of trustzone-m-based iot systems
L Luo, Y Zhang, C White, B Keating… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been increasingly integrated into our daily life.
However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the …
However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the …
Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution
Intel Security Guard Extensions (SGX) have shown effectiveness in critical data protection.
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …
Recent symbolic execution-based techniques reveal that SGX applications are susceptible …
Controlled data races in enclaves: Attacks and detection
This paper introduces controlled data race attacks, a new class of attacks against programs
guarded by trusted execution environments such as Intel SGX. Controlled data race attacks …
guarded by trusted execution environments such as Intel SGX. Controlled data race attacks …
Flare: A fast, secure, and memory-efficient distributed analytics framework
As big data processing in the cloud becomes prevalent today, data privacy on such public
platforms raises critical concerns. Hardware-based trusted execution environments (TEEs) …
platforms raises critical concerns. Hardware-based trusted execution environments (TEEs) …