Research progress of SGX application supporting techniques
董春涛, 沈晴霓, 罗武, 吴鹏飞, 吴中海 - Journal of Software, 2020 - jos.org.cn
安全与可信是云计算中极为重要的需求, 如何保护用户在云平台上托管的应用程序代码和数据的
安全, 防止云服务提供商和其他攻击者窃取用户机密数据, 一直是个难题. 2013 年, Intel …
安全, 防止云服务提供商和其他攻击者窃取用户机密数据, 一直是个难题. 2013 年, Intel …
Analysis and research on SGX technology
王鹃, 樊成阳, 程越强, 赵波, 韦韬, 严飞, 张焕国… - Journal of Software, 2018 - jos.org.cn
安全性是云计算中一项极为重要的需求, 然而如何保护云计算中关键应用程序和数据的安全,
防止云平台管理员泄露用户隐私, 仍然是目前没有解决的难题. 2013 年, Intel …
防止云平台管理员泄露用户隐私, 仍然是目前没有解决的难题. 2013 年, Intel …
SGX 技术的分析和研究
王鹃, 樊成阳, 程越强, 赵波, 韦韬, 严飞, 张焕国… - 软件学报, 2018 - jos.org.cn
安全性是云计算中一项极为重要的需求, 然而如何保护云计算中关键应用程序和数据的安全,
防止云平台管理员泄露用户隐私, 仍然是目前没有解决的难题. 2013 年, Intel …
防止云平台管理员泄露用户隐私, 仍然是目前没有解决的难题. 2013 年, Intel …
Secure programming with intel sgx and novel applications
KM Severinsen - 2017 - duo.uio.no
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent
generations of Intel processors. SGX is supposed to be able to create a trusted execution …
generations of Intel processors. SGX is supposed to be able to create a trusted execution …
Squad: A secure, simple storage service for sgx-based microservices
MSL da Silva, FF de Oliveira Silva… - 2019 9th Latin-American …, 2019 - ieeexplore.ieee.org
Intel SGX has been the subject of numerous research and development projects. Moreover,
this technology has been considered a robust option to secure the data being processed in …
this technology has been considered a robust option to secure the data being processed in …
Uranus: Simple, efficient sgx programming and its applications
Applications written in Java have strengths to tackle diverse threats in public clouds, but
these applications are still prone to privileged attacks when processing plaintext data. Intel …
these applications are still prone to privileged attacks when processing plaintext data. Intel …
Survey of attacks and defenses against SGX
Y Zhang, M Zhao, T Li, H Han - 2020 IEEE 5th Information …, 2020 - ieeexplore.ieee.org
The great abundance of information brings us convenient life. At the same time, how to
prevent malicious attackers from stealing user data or privacy is a hot and difficult issue in …
prevent malicious attackers from stealing user data or privacy is a hot and difficult issue in …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
Sgxio: Generic trusted i/o path for intel sgx
S Weiser, M Werner - Proceedings of the seventh ACM on conference …, 2017 - dl.acm.org
Application security traditionally strongly relies upon security of the underlying operating
system. However, operating systems often fall victim to software attacks, compromising …
system. However, operating systems often fall victim to software attacks, compromising …
Trusted code execution on untrusted platforms using Intel SGX
G Noubir, A Sanatinia - Virus bulletin, 2016 - par.nsf.gov
Today, isolated trusted computation and code execution is of paramount importance to
protect sensitive information and workflows from other malicious privileged or unprivileged …
protect sensitive information and workflows from other malicious privileged or unprivileged …