Smart grid metering networks: A survey on security, privacy and open research issues

P Kumar, Y Lin, G Bai, A Paverd… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

A comparison study of intel SGX and AMD memory encryption technology

S Mofrad, F Zhang, S Lu, W Shi - … of the 7th International Workshop on …, 2018 - dl.acm.org
Hardware-assisted trusted execution environments are secure isolation technologies that
have been engineered to serve as efficient defense mechanisms to provide a security …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - Proceedings of the 35th …, 2019 - dl.acm.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …

vSGX: virtualizing SGX enclaves on AMD SEV

S Zhao, M Li, Y Zhangyz, Z Lin - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The growing need of trusted execution environment (TEE) has boomed the development of
hardware enclaves. However, current TEEs and their applications are tightly bound to the …

[HTML][HTML] EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion

W Wei, J Wang, Z Yan, W Ding - Information Fusion, 2022 - Elsevier
Android has stood at a predominant position in mobile operating systems for many years.
However, its popularity and openness make it a desirable target of malicious attackers …

Blockchain and biometrics: A first look into opportunities and challenges

O Delgado-Mohatar, J Fierrez, R Tolosana… - Blockchain and …, 2020 - Springer
Blockchain technology has become a thriving topic in the last years, making possible to
transform old-fashioned operations to more fast, secured, and cheap approaches. In this …

Secure and private function evaluation with Intel SGX

S Felsen, Á Kiss, T Schneider, C Weinert - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Secure function evaluation (SFE) allows two parties to jointly evaluate a publicly known
function without revealing their respective inputs. SFE can be realized via well-known …

DR. SGX: hardening SGX enclaves against cache attacks with data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - arxiv preprint arxiv …, 2017 - arxiv.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …