Intel tdx demystified: A top-down approach

PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu… - ACM Computing …, 2024 - dl.acm.org
Intel Trust Domain Extensions (TDX) is an architectural extension in the 4th Generation Intel
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Ríos, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Graviton: Trusted execution environments on {GPUs}

S Volos, K Vaswani, R Bruno - 13th USENIX Symposium on Operating …, 2018 - usenix.org
We propose Graviton, an architecture for supporting trusted execution environments on
GPUs. Graviton enables applications to offload security-and performance-sensitive kernels …

Scalable memory protection in the {PENGLAI} enclave

E Feng, X Lu, D Du, B Yang, X Jiang, Y **a… - … on Operating Systems …, 2021 - usenix.org
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …

Komodo: Using verification to disentangle secure-enclave hardware from software

A Ferraiuolo, A Baumann, C Hawblitzel… - Proceedings of the 26th …, 2017 - dl.acm.org
Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected
against physical attacks and privileged software adversaries. However, to achieve this, Intel …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

Confidential computing for OpenPOWER

GDH Hunt, R Pai, MV Le, H Jamjoom… - Proceedings of the …, 2021 - dl.acm.org
This paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted
Execution Environment (TEE) for confidential computing on Power ISA. PEF enables …

Verification of a practical hardware security architecture through static information flow analysis

A Ferraiuolo, R Xu, D Zhang, AC Myers… - Proceedings of the …, 2017 - dl.acm.org
Hardware-based mechanisms for software isolation are becoming increasingly popular, but
implementing these mechanisms correctly has proved difficult, undermining the root of …

DeepAttest: An end-to-end attestation framework for deep neural networks

H Chen, C Fu, BD Rouhani, J Zhao… - Proceedings of the 46th …, 2019 - dl.acm.org
Emerging hardware architectures for Deep Neural Networks (DNNs) are being
commercialized and considered as the hardware-level Intellectual Property (IP) of the device …

[PDF][PDF] Keystone: A framework for architecting tees

D Lee, D Kohlbrenner, S Shinde, D Song… - arxiv preprint arxiv …, 2019 - academia.edu
Trusted execution environments (TEEs) are becoming a requirement across a wide range of
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …