Tesseract: Real-time cryptocurrency exchange using trusted hardware

I Bentov, Y Ji, F Zhang, L Breidenbach… - Proceedings of the …, 2019 - dl.acm.org
We propose Tesseract, a secure real-time cryptocurrency exchange service. Existing
centralized exchange designs are vulnerable to theft of funds, while decentralized …

{V0LTpwn}: Attacking x86 processor integrity from software

Z Kenjar, T Frassetto, D Gens, M Franz… - 29th USENIX Security …, 2020 - usenix.org
Fault-injection attacks have been proven in the past to be a reliable way of bypassing
hardware-based security measures, such as cryptographic hashes, privilege and access …

DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - Proceedings of the 35th …, 2019 - dl.acm.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …

DR. SGX: hardening SGX enclaves against cache attacks with data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - arxiv preprint arxiv …, 2017 - arxiv.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …

Private delegated computations using strong isolation

M Brossard, G Bryant, B El Gaabouri… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
Computations are now routinely delegated to third-parties. In response, Confidential
Computing technologies are being added to microprocessors offering a trusted execution …

[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing

J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …

[PDF][PDF] Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

FFP Brasser - 2020 - tuprints.ulb.tu-darmstadt.de
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute
the basis for the protection of modern software systems. Hardware-enforced isolation of …