Security vulnerabilities of SGX and countermeasures: A survey

S Fei, Z Yan, W Ding, H ** review and future research agenda
KD Pandl, S Thiebes, M Schmidt-Kraepelin… - IEEE …, 2020 - ieeexplore.ieee.org
Developments in artificial intelligence (AI) and distributed ledger technology (DLT) currently
lead to lively debates in academia and practice. AI processes data to perform tasks that were …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

{CURE}: A security architecture with {CUstomizable} and resilient enclaves

R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …

{V0LTpwn}: Attacking x86 processor integrity from software

Z Kenjar, T Frassetto, D Gens, M Franz… - 29th USENIX Security …, 2020 - usenix.org
Fault-injection attacks have been proven in the past to be a reliable way of bypassing
hardware-based security measures, such as cryptographic hashes, privilege and access …

Data protection in AI services: A survey

C Meurisch, M Mühlhäuser - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …

Twine: An embedded trusted runtime for webassembly

J Ménétrey, M Pasin, P Felber… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
WebAssembly is an Increasingly popular lightweight binary instruction format, which can be
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …

Visor:{Privacy-Preserving} video analytics as a cloud service

R Poddar, G Ananthanarayanan, S Setty… - 29th USENIX Security …, 2020 - usenix.org
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key
concern in such services is privacy of the videos being analyzed. While trusted execution …

{CopyCat}: Controlled {Instruction-Level} attacks on enclaves

D Moghimi, J Van Bulck, N Heninger… - 29th USENIX security …, 2020 - usenix.org
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …

Obelix: Mitigating side-channels through dynamic obfuscation

J Wichelmann, A Rabich, A Pätschke… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Trusted execution environments (TEEs) offer hardware-assisted means to protect code and
data. However, as shown in numerous results over the years, attackers can use side …