Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Network policies in kubernetes: Performance evaluation and security analysis

G Budigiri, C Baumann, JT Mühlberg… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
5G applications with ultra-high reliability and low latency requirements necessitate the
adoption of edge computing solutions in mobile networks. Container orchestration …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

{TeeRex}: Discovery and exploitation of memory corruption vulnerabilities in {SGX} enclaves

T Cloosters, M Rodler, L Davi - 29th USENIX Security Symposium …, 2020 - usenix.org
Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor
to enclave mode which protects it from introspection. While the enclave mode strongly …

sgx-perf: A performance analysis tool for intel sgx enclaves

N Weichbrodt, PL Aublin, R Kapitza - Proceedings of the 19th …, 2018 - dl.acm.org
Novel trusted execution technologies such as Intel's Software Guard Extensions (SGX) are
considered a cure to many security risks in clouds. This is achieved by offering trusted …

Everything you should know about Intel SGX performance on virtualized systems

T Dinh Ngoc, B Bui, S Bitchebe, A Tchana… - Proceedings of the …, 2019 - dl.acm.org
Intel SGX has attracted much attention from academia and is already powering commercial
applications. Cloud providers have also started implementing SGX in their cloud offerings …

LightBox: Full-stack protected stateful middlebox at lightning speed

H Duan, C Wang, X Yuan, Y Zhou, Q Wang… - Proceedings of the 2019 …, 2019 - dl.acm.org
Running off-site software middleboxes at third-party service providers has been a popular
practice. However, routing large volumes of raw traffic, which may carry sensitive …

[PDF][PDF] Keystone: A framework for architecting tees

D Lee, D Kohlbrenner, S Shinde, D Song… - arxiv preprint arxiv …, 2019 - academia.edu
Trusted execution environments (TEEs) are becoming a requirement across a wide range of
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …

SvTPM: SGX-based virtual trusted platform modules for cloud computing

J Wang, J Wang, C Fan, F Yan, Y Cheng… - … on Cloud Computing, 2023 - ieeexplore.ieee.org
Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms
(eg, VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and …

Endbox: Scalable middlebox functions using client-side trusted execution

D Goltzsche, S Rüsch, M Nieke… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Many organisations enhance the performance, security, and functionality of their managed
networks by deploying middleboxes centrally as part of their core network. While this …