A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems

L Coppolino, S D'Antonio, V Formicola… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Protecting data-in-use from privileged attackers is challenging. New CPU extensions
(notably: Intel SGX) and cryptographic techniques (specifically: Homomorphic Encryption) …

Hybridchain: A novel architecture for confidentiality-preserving and performant permissioned blockchain using trusted execution environment

Y Wang, J Li, S Zhao, F Yu - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain is making headlines due to it promises to provide a decentralized, transparent,
tamper-resistant, traceable and verifiable historical transaction records that can resist faults …

Language support for secure software development with enclaves

A Oak, AM Ahmadian, M Balliu… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Confidential computing is a promising technology for securing code and data-in-use on
untrusted host machines, eg, the cloud. Many hardware vendors offer different …

Secure cross-border exchange of health related data: the KONFIDO approach

S Diamantopoulos, D Karamitros, L Romano… - Internet and Distributed …, 2019 - Springer
This paper sets up the scene of the KONFIDO project in a clear way. In particular, it:(i)
defines KONFIDO objectives and draws KONFIDO boundaries;(ii) identifies KONFIDO users …

Isolating real-time safety-critical embedded systems via sgx-based lightweight virtualization

L De Simone, G Mazzeo - 2019 IEEE International Symposium …, 2019 - ieeexplore.ieee.org
A promising approach for designing critical embedded systems is based on virtualization
technologies and multi-core platforms. These enable the deployment of both real-time and …

Opinion mining in consumers food choice and quality perception

A Amato, G Cozzolino, M Giacalone - … on P2P, Parallel, Grid, Cloud and …, 2020 - Springer
In this work we present a system for the automatic analysis of text comments related to food
products. Systematic analysis means allowing an analyst to have at a glance all the needed …

SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization

G Mazzeo, S Arnautov, C Fetzer… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Intel SGX has started to be widely adopted. Cloud providers (Microsoft Azure, IBM Cloud,
Alibaba Cloud) are offering new solutions, implementing data-in-use protection via SGX. A …

Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX

X Miao, Z Lin, S Wang, L Yu, S Li… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Intel's SGX is a confidential computing technique. It allows key functionalities of
C/C++/native applications to be confidentially executed in hardware enclaves. However …

Mobile Phones in the Cloud-Edge Continuum: Understanding the TEE's Role

A De Crecchio, GM Cristiano, A Petruolo - International Conference on …, 2024 - Springer
Recent years have seen the cloud computing landscape shift from a centralized model,
primarily based on large data centers, to a more distributed and heterogeneous architecture …