Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security vulnerabilities of SGX and countermeasures: A survey
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …
appealing research subject for a wide range of computer systems, from low-end embedded …
{V0LTpwn}: Attacking x86 processor integrity from software
Fault-injection attacks have been proven in the past to be a reliable way of bypassing
hardware-based security measures, such as cryptographic hashes, privilege and access …
hardware-based security measures, such as cryptographic hashes, privilege and access …
Data protection in AI services: A survey
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …
enhanced personalization and better support. As such AI-based services inevitably require …
Twine: An embedded trusted runtime for webassembly
WebAssembly is an Increasingly popular lightweight binary instruction format, which can be
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …
Visor:{Privacy-Preserving} video analytics as a cloud service
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key
concern in such services is privacy of the videos being analyzed. While trusted execution …
concern in such services is privacy of the videos being analyzed. While trusted execution …
{CopyCat}: Controlled {Instruction-Level} attacks on enclaves
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …
researchers to investigate unusual attack vectors. One particularly powerful class of …
Obelix: Mitigating side-channels through dynamic obfuscation
Trusted execution environments (TEEs) offer hardware-assisted means to protect code and
data. However, as shown in numerous results over the years, attackers can use side …
data. However, as shown in numerous results over the years, attackers can use side …