A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
Security vulnerabilities of SGX and countermeasures: A survey
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …
applications. The popularity of TEEs derives from its high security and trustworthiness …
Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …
included in recent Intel x86 processors, gained significant traction in recent years. A long …
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017 - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
Sok: Sgx. fail: How stuff gets exposed
S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …
protected from all software running on the machine. As such, numerous works have sought …
EnclaveDB: A secure database using SGX
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …
freshness for data and queries. EnclaveDB guarantees these properties even when the …
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
Cachezoom: How SGX amplifies the power of cache attacks
In modern computing environments, hardware resources are commonly shared, and parallel
computation is widely used. Parallel tasks can cause privacy and security problems if proper …
computation is widely used. Parallel tasks can cause privacy and security problems if proper …