A survey of distributed consensus protocols for blockchain networks

Y **ao, N Zhang, W Lou, YT Hou - … Communications Surveys & …, 2020 - ieeexplore.ieee.org
Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology
have attracted an increasing interest from both academia and industry. Among various core …

Blockchain-empowered space-air-ground integrated networks: Opportunities, challenges, and solutions

Y Wang, Z Su, J Ni, N Zhang… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The terrestrial networks face the challenges of severe cost inefficiency and low feasibility to
provide seamless services anytime and anywhere, especially in the extreme or hotspot …

Advances and open problems in federated learning

P Kairouz, HB McMahan, B Avent… - … and trends® in …, 2021 - nowpublishers.com
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …

Toward trustworthy AI development: mechanisms for supporting verifiable claims

M Brundage, S Avin, J Wang, H Belfield… - arxiv preprint arxiv …, 2020 - arxiv.org
With the recent wave of progress in artificial intelligence (AI) has come a growing awareness
of the large-scale impacts of AI systems, and recognition that existing regulations and norms …

Delphi: A cryptographic inference system for neural networks

P Mishra, R Lehmkuhl, A Srinivasan, W Zheng… - Proceedings of the …, 2020 - dl.acm.org
Many companies provide neural network prediction services to users for a wide range of
applications. However, current prediction systems compromise one party's privacy: either the …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

ZombieLoad: Cross-privilege-boundary data sampling

M Schwarz, M Lipp, D Moghimi, J Van Bulck… - Proceedings of the …, 2019 - dl.acm.org
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …

Intel tdx demystified: A top-down approach

PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu… - ACM Computing …, 2024 - dl.acm.org
Intel Trust Domain Extensions (TDX) is an architectural extension in the 4th Generation Intel
Xeon Scalable Processor that supports confidential computing. TDX allows the deployment …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …