Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A vademecum on blockchain technologies: When, which, and how
Blockchain is a technology making the shared registry concept from distributed systems a
reality for a number of application domains, from the cryptocurrency one to potentially any …
reality for a number of application domains, from the cryptocurrency one to potentially any …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
Untangling blockchain: A data processing view of blockchain systems
Blockchain technologies are gaining massive momentum in the last few years. Blockchains
are distributed ledgers that enable parties who do not fully trust each other to maintain a set …
are distributed ledgers that enable parties who do not fully trust each other to maintain a set …
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
Software grand exposure:{SGX} cache attacks are practical
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
Machine learning models that remember too much
Machine learning (ML) is becoming a commodity. Numerous ML frameworks and services
are available to data holders who are not ML experts but want to train predictive models on …
are available to data holders who are not ML experts but want to train predictive models on …
Prochlo: Strong privacy for analytics in the crowd
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
Opaque: An oblivious and encrypted distributed analytics platform
Many systems run rich analytics on sensitive data in the cloud, but are prone to data
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …