Security vulnerabilities of SGX and countermeasures: A survey
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …
applications. The popularity of TEEs derives from its high security and trustworthiness …
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Decentralized IoT data management using blockchain and trusted execution environment
Due to the centralization of authority in the management of data generated by IoT devices,
there is a lack of transparency in how user data is being shared among third party entities …
there is a lack of transparency in how user data is being shared among third party entities …
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
Poison forensics: Traceback of data poisoning attacks in neural networks
In adversarial machine learning, new defenses against attacks on deep learning systems
are routinely broken soon after their release by more powerful attacks. In this context …
are routinely broken soon after their release by more powerful attacks. In this context …
{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding
In recent years, the Advanced Persistent Threat (APT), which involves complex and
malicious actions over a long period, has become one of the biggest threats against the …
malicious actions over a long period, has become one of the biggest threats against the …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
Nodemerge: Template based efficient data reduction for big-data causality analysis
Today's enterprises are exposed to sophisticated attacks, such as Advanced Persistent
Threats~(APT) attacks, which usually consist of stealthy multiple steps. To counter these …
Threats~(APT) attacks, which usually consist of stealthy multiple steps. To counter these …
Custos: Practical tamper-evident auditing of operating systems using trusted execution
System auditing is a central concern when investigating and responding to security
incidents. Unfortunately, attackers regularly engage in anti-forensic activities after a break-in …
incidents. Unfortunately, attackers regularly engage in anti-forensic activities after a break-in …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …