Privacy-enhancing technologies in biomedical data science

H Cho, D Froelicher, N Dokmai, A Nandi… - Annual review of …, 2024 - annualreviews.org
The rapidly growing scale and variety of biomedical data repositories raise important privacy
concerns. Conventional frameworks for collecting and sharing human subject data offer …

Nimble: Rollback protection for confidential cloud services

S Angel, A Basu, W Cui, T Jaeger, S Lau… - … USENIX Symposium on …, 2023 - usenix.org
This paper introduces Nimble, a cloud service that helps applications running in trusted
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …

Confidential consortium framework: Secure multiparty applications with confidentiality, integrity, and high availability

H Howard, F Alder, E Ashton, A Chamayou… - arxiv preprint arxiv …, 2023 - arxiv.org
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …

Sgxonerated: Finding (and partially fixing) privacy flaws in tee-based smart contract platforms without breaking the tee

N Jean-Louis, Y Li, Y Ji, H Malvai, T Yurek… - Proceedings on …, 2024 - petsymposium.org
TEE-based smart contracts are an emerging blockchain architecture, offering fully
programmable privacy with better performance than alternatives like secure multiparty …

Teamwork makes tee work: open and resilient remote attestation on decentralized trust

X Zhang, K Qin, S Qu, T Wang, C Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …

Props for Machine-Learning Security

A Juels, F Koushanfar - arxiv preprint arxiv:2410.20522, 2024 - arxiv.org
We propose protected pipelines or props for short, a new approach for authenticated,
privacy-preserving access to deep-web data for machine learning (ML). By permitting secure …

Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arxiv preprint arxiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …

HasTEE: Programming Trusted Execution Environments with Haskell

A Sarkar, R Krook, A Russo, K Claessen - Proceedings of the 16th ACM …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are hardware enforced memory isolation units,
emerging as a pivotal security solution for security-critical applications. TEEs, like Intel SGX …

Pragmatic analysis of key management for cryptocurrency custodians

Y Takei, K Shudo - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
We discuss key management for cryptocurrencies from the perspective of security and risk
management. While we found many earlier research studies about the implementation and …

SoK: Trusted setups for powers-of-tau strings

F Wang, S Cohney, J Bonneau - Cryptology ePrint Archive, 2025 - eprint.iacr.org
Many cryptographic protocols rely upon an initial\emph {trusted setup} to generate public
parameters. While the concept is decades old, trusted setups have gained prominence with …