A vademecum on blockchain technologies: When, which, and how

M Belotti, N Božić, G Pujolle… - … Surveys & Tutorials, 2019‏ - ieeexplore.ieee.org
Blockchain is a technology making the shared registry concept from distributed systems a
reality for a number of application domains, from the cryptocurrency one to potentially any …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020‏ - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Untangling blockchain: A data processing view of blockchain systems

TTA Dinh, R Liu, M Zhang, G Chen… - IEEE transactions on …, 2018‏ - ieeexplore.ieee.org
Blockchain technologies are gaining massive momentum in the last few years. Blockchains
are distributed ledgers that enable parties who do not fully trust each other to maintain a set …

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019‏ - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …

Software grand exposure:{SGX} cache attacks are practical

F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017‏ - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …

Machine learning models that remember too much

C Song, T Ristenpart, V Shmatikov - Proceedings of the 2017 ACM …, 2017‏ - dl.acm.org
Machine learning (ML) is becoming a commodity. Numerous ML frameworks and services
are available to data holders who are not ML experts but want to train predictive models on …

Prochlo: Strong privacy for analytics in the crowd

A Bittau, Ú Erlingsson, P Maniatis, I Mironov… - Proceedings of the 26th …, 2017‏ - dl.acm.org
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …

Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017‏ - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017‏ - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

Opaque: An oblivious and encrypted distributed analytics platform

W Zheng, A Dave, JG Beekman, RA Popa… - … USENIX Symposium on …, 2017‏ - usenix.org
Many systems run rich analytics on sensitive data in the cloud, but are prone to data
breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary …