Security vulnerabilities of SGX and countermeasures: A survey
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …
applications. The popularity of TEEs derives from its high security and trustworthiness …
A survey of Layer-two blockchain protocols
A Gangwal, HR Gangavalli, A Thirupathi - Journal of Network and …, 2023 - Elsevier
After the success of the Bitcoin blockchain, came several cryptocurrencies and blockchain
solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low …
solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low …
[HTML][HTML] A survey on blockchain technology and its security
H Guo, X Yu - Blockchain: research and applications, 2022 - Elsevier
Blockchain is a technology that has desirable features of decentralization, autonomy,
integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency …
integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency …
Sok: Layer-two blockchain protocols
Blockchains have the potential to revolutionize markets and services. However, they
currently exhibit high latencies and fail to handle transaction loads comparable to those …
currently exhibit high latencies and fail to handle transaction loads comparable to those …
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Benzene: Scaling blockchain with cooperation-based sharding
Sharding has been considered as a prominent approach to enhance the limited
performance of blockchain. However, most sharding systems leverage a non-cooperative …
performance of blockchain. However, most sharding systems leverage a non-cooperative …
Focus on blockchain: A comprehensive survey on academic and application
Y Zou, T Meng, P Zhang, W Zhang, H Li - IEEE Access, 2020 - ieeexplore.ieee.org
As a decentralized distributed ledger, blockchain has developed rapidly since its birth and
has been highly valued by governments, academia, and industry. Start in the financial field …
has been highly valued by governments, academia, and industry. Start in the financial field …
When blockchain meets SGX: An overview, challenges, and open issues
As a decentralized, public, and digital ledger technology in Peer-to-Peer network,
blockchain has received much attention from various fields, including finance, healthcare …
blockchain has received much attention from various fields, including finance, healthcare …
Syncattack: Double-spending in bitcoin without mining power
The existing Bitcoin security research has mainly followed the security models in [22, 35],
which stipulate that an adversary controls some mining power in order to violate the …
which stipulate that an adversary controls some mining power in order to violate the …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …