When blockchain meets SGX: An overview, challenges, and open issues

Z Bao, Q Wang, W Shi, L Wang, H Lei, B Chen - Ieee Access, 2020 - ieeexplore.ieee.org
As a decentralized, public, and digital ledger technology in Peer-to-Peer network,
blockchain has received much attention from various fields, including finance, healthcare …

{AEX-Notify}: Thwarting Precise {Single-Step**} Attacks through Interrupt Awareness for Intel {SGX} Enclaves

S Constable, J Van Bulck, X Cheng, Y **ao… - 32nd USENIX Security …, 2023 - usenix.org
Intel® Software Guard Extensions (Intel® SGX) supports the creation of shielded enclaves
within unprivileged processes. While enclaves are architecturally protected against …

Occlumency: Privacy-preserving remote deep-learning inference using SGX

T Lee, Z Lin, S Pushp, C Li, Y Liu, Y Lee, F Xu… - The 25th Annual …, 2019 - dl.acm.org
Deep-learning (DL) is receiving huge attention as enabling techniques for emerging mobile
and IoT applications. It is a common practice to conduct DNN model-based inference using …

Benchmarking the second generation of intel sgx hardware

M El-Hindi, T Ziegler, M Heinrich, A Lutsch… - Proceedings of the 18th …, 2022 - dl.acm.org
In recent years, trusted execution environments (TEEs) such as Intel Software Guard
Extensions (SGX) have gained a lot of attention in the database community. This is because …

Engraft: Enclave-guarded raft on byzantine faulty nodes

W Wang, S Deng, J Niu, MK Reiter… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …

Confidentiality support over financial grade consortium blockchain

Y Yan, C Wei, X Guo, X Lu, X Zheng, Q Liu… - Proceedings of the …, 2020 - dl.acm.org
Confidentiality is an indispensable requirement in financial applications of blockchain
technology, and supporting it along with high performance and friendly programmability is …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Citadel: Protecting data privacy and model confidentiality for collaborative learning

C Zhang, J **a, B Yang, H Puyang, W Wang… - Proceedings of the …, 2021 - dl.acm.org
Many organizations own data but have limited machine learning expertise (data owners). On
the other hand, organizations that have expertise need data from diverse sources to train …

Goten: Gpu-outsourcing trusted execution of neural network training

LKL Ng, SSM Chow, APY Woo, DPH Wong… - Proceedings of the AAAI …, 2021 - ojs.aaai.org
Deep learning unlocks applications with societal impacts, eg, detecting child exploitation
imagery and genomic analysis of rare diseases. Deployment, however, needs compliance …

SvTPM: SGX-based virtual trusted platform modules for cloud computing

J Wang, J Wang, C Fan, F Yan, Y Cheng… - … on Cloud Computing, 2023 - ieeexplore.ieee.org
Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms
(eg, VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and …