Smart grid metering networks: A survey on security, privacy and open research issues
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
A comparison study of intel SGX and AMD memory encryption technology
Hardware-assisted trusted execution environments are secure isolation technologies that
have been engineered to serve as efficient defense mechanisms to provide a security …
have been engineered to serve as efficient defense mechanisms to provide a security …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …
vSGX: virtualizing SGX enclaves on AMD SEV
The growing need of trusted execution environment (TEE) has boomed the development of
hardware enclaves. However, current TEEs and their applications are tightly bound to the …
hardware enclaves. However, current TEEs and their applications are tightly bound to the …
[HTML][HTML] EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion
Android has stood at a predominant position in mobile operating systems for many years.
However, its popularity and openness make it a desirable target of malicious attackers …
However, its popularity and openness make it a desirable target of malicious attackers …
Blockchain and biometrics: A first look into opportunities and challenges
Blockchain technology has become a thriving topic in the last years, making possible to
transform old-fashioned operations to more fast, secured, and cheap approaches. In this …
transform old-fashioned operations to more fast, secured, and cheap approaches. In this …
Secure and private function evaluation with Intel SGX
Secure function evaluation (SFE) allows two parties to jointly evaluate a publicly known
function without revealing their respective inputs. SFE can be realized via well-known …
function without revealing their respective inputs. SFE can be realized via well-known …
DR. SGX: hardening SGX enclaves against cache attacks with data location randomization
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …