Intel tdx demystified: A top-down approach

PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu… - ACM Computing …, 2024 - dl.acm.org
Intel Trust Domain Extensions (TDX) is an architectural extension in the 4th Generation Intel
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …

Survey of research on confidential computing

D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …

{SHELTER}: Extending arm {CCA} with isolation in user space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

Shedding light on static partitioning hypervisors for arm-based mixed-criticality systems

J Martins, S Pinto - 2023 IEEE 29th Real-Time and Embedded …, 2023 - ieeexplore.ieee.org
In this paper, we aim to understand the properties and guarantees of static partitioning
hypervisors (SPH) for Arm-based mixed-criticality systems (MCS). To this end, we performed …

Obelix: Mitigating side-channels through dynamic obfuscation

J Wichelmann, A Rabich, A Pätschke… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Trusted execution environments (TEEs) offer hardware-assisted means to protect code and
data. However, as shown in numerous results over the years, attackers can use side …

Confidential consortium framework: Secure multiparty applications with confidentiality, integrity, and high availability

H Howard, F Alder, E Ashton, A Chamayou… - arxiv preprint arxiv …, 2023 - arxiv.org
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …

{VeriSMo}: A verified security module for confidential {VMs}

Z Zhou, W Chen, S Gong, C Hawblitzel… - 18th USENIX Symposium …, 2024 - usenix.org
Hardware vendors have introduced confidential VM architectures (eg, AMD SEV-SNP, Intel
TDX and Arm CCA) in recent years. They eliminate the trust in the hypervisor and lead to the …

Deta: Minimizing data leaks in federated learning via decentralized and trustworthy aggregation

PC Cheng, K Eykholt, Z Gu, H Jamjoom… - Proceedings of the …, 2024 - dl.acm.org
Federated learning (FL) relies on a central authority to oversee and aggregate model
updates contributed by multiple participating parties in the training process. This …

A verification methodology for the arm® confidential computing architecture: From a secure specification to safe implementations

ACJ Fox, G Stockwell, S **ong, H Becker… - Proceedings of the …, 2023 - dl.acm.org
We present Arm's efforts in verifying the specification and prototype reference
implementation of the Realm Management Monitor (RMM), an essential firmware …

{BlackBox}: a container security monitor for protecting containers on untrusted operating systems

A Van't Hof, J Nieh - 16th USENIX Symposium on Operating Systems …, 2022 - usenix.org
Containers are widely deployed to package, isolate, and multiplex applications on shared
computing infrastructure, but rely on the operating system to enforce their security …