Security vulnerabilities of SGX and countermeasures: A survey

S Fei, Z Yan, W Ding, H **e - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Decentralized IoT data management using blockchain and trusted execution environment

G Ayoade, V Karande, L Khan… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Due to the centralization of authority in the management of data generated by IoT devices,
there is a lack of transparency in how user data is being shared among third party entities …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

Poison forensics: Traceback of data poisoning attacks in neural networks

S Shan, AN Bhagoji, H Zheng, BY Zhao - 31st USENIX Security …, 2022 - usenix.org
In adversarial machine learning, new defenses against attacks on deep learning systems
are routinely broken soon after their release by more powerful attacks. In this context …

{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding

F Yang, J Xu, C **ong, Z Li, K Zhang - 32nd USENIX Security …, 2023 - usenix.org
In recent years, the Advanced Persistent Threat (APT), which involves complex and
malicious actions over a long period, has become one of the biggest threats against the …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

Nodemerge: Template based efficient data reduction for big-data causality analysis

Y Tang, D Li, Z Li, M Zhang, K Jee, X **ao… - Proceedings of the …, 2018 - dl.acm.org
Today's enterprises are exposed to sophisticated attacks, such as Advanced Persistent
Threats~(APT) attacks, which usually consist of stealthy multiple steps. To counter these …

Custos: Practical tamper-evident auditing of operating systems using trusted execution

R Paccagnella, P Datta, WU Hassan, A Bates… - Network and distributed …, 2020 - par.nsf.gov
System auditing is a central concern when investigating and responding to security
incidents. Unfortunately, attackers regularly engage in anti-forensic activities after a break-in …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …