Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intel tdx demystified: A top-down approach
Intel Trust Domain Extensions (TDX) is an architectural extension in the 4th Generation Intel
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …
Survey of research on confidential computing
D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …
more rapidly, the demand for data security and privacy protection has become increasingly …
{SHELTER}: Extending arm {CCA} with isolation in user space
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …
seamless interaction with numerous mobile and server devices. TrustZone is a promising …
Shedding light on static partitioning hypervisors for arm-based mixed-criticality systems
In this paper, we aim to understand the properties and guarantees of static partitioning
hypervisors (SPH) for Arm-based mixed-criticality systems (MCS). To this end, we performed …
hypervisors (SPH) for Arm-based mixed-criticality systems (MCS). To this end, we performed …
Obelix: Mitigating side-channels through dynamic obfuscation
J Wichelmann, A Rabich, A Pätschke… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Trusted execution environments (TEEs) offer hardware-assisted means to protect code and
data. However, as shown in numerous results over the years, attackers can use side …
data. However, as shown in numerous results over the years, attackers can use side …
Confidential consortium framework: Secure multiparty applications with confidentiality, integrity, and high availability
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …
properties for trustworthy data systems. The rise of cloud computing and the growing …
{VeriSMo}: A verified security module for confidential {VMs}
Z Zhou, W Chen, S Gong, C Hawblitzel… - 18th USENIX Symposium …, 2024 - usenix.org
Hardware vendors have introduced confidential VM architectures (eg, AMD SEV-SNP, Intel
TDX and Arm CCA) in recent years. They eliminate the trust in the hypervisor and lead to the …
TDX and Arm CCA) in recent years. They eliminate the trust in the hypervisor and lead to the …
Deta: Minimizing data leaks in federated learning via decentralized and trustworthy aggregation
Federated learning (FL) relies on a central authority to oversee and aggregate model
updates contributed by multiple participating parties in the training process. This …
updates contributed by multiple participating parties in the training process. This …
A verification methodology for the arm® confidential computing architecture: From a secure specification to safe implementations
ACJ Fox, G Stockwell, S **ong, H Becker… - Proceedings of the …, 2023 - dl.acm.org
We present Arm's efforts in verifying the specification and prototype reference
implementation of the Realm Management Monitor (RMM), an essential firmware …
implementation of the Realm Management Monitor (RMM), an essential firmware …
{BlackBox}: a container security monitor for protecting containers on untrusted operating systems
A Van't Hof, J Nieh - 16th USENIX Symposium on Operating Systems …, 2022 - usenix.org
Containers are widely deployed to package, isolate, and multiplex applications on shared
computing infrastructure, but rely on the operating system to enforce their security …
computing infrastructure, but rely on the operating system to enforce their security …