A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems

B Hu, Z Zhang, J Liu, Y Liu, J Yin, R Lu, X Lin - Patterns, 2021 - cell.com
Smart contracts are regarded as one of the most promising and appealing notions in
blockchain technology. Their self-enforcing and event-driven features make some online …

Zexe: Enabling decentralized private computation

S Bowe, A Chiesa, M Green, I Miers… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Ledger-based systems that support rich applications often suffer from two limitations. First,
validating a transaction requires re-executing the state transition that it attests to. Second …

A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms

NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …

A survey of published attacks on Intel SGX

A Nilsson, PN Bideh, J Brorsson - arXiv preprint arXiv:2006.13598, 2020 - arxiv.org
Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to
run code and operate sensitive data. SGX provides runtime hardware protection where both …

Autarky: Closing controlled channels with self-paging enclaves

M Orenbach, A Baumann, M Silberstein - Proceedings of the Fifteenth …, 2020 - dl.acm.org
As the first widely-deployed secure enclave hardware, Intel SGX shows promise as a
practical basis for confidential cloud computing. However, side channels remain SGX's …

Mptee: bringing flexible and efficient memory protection to intel sgx

W Zhao, K Lu, Y Qi, S Qi - … of the Fifteenth European Conference on …, 2020 - dl.acm.org
Intel Software Guard extensions (SGX), a hardware-based Trusted Execution Environment
(TEE), has become a promising solution to stopping critical threats such as insider attacks …

The price of Meltdown and Spectre: Energy overhead of mitigations at operating system level

B Herzog, S Reif, J Preis… - Proceedings of the 14th …, 2021 - dl.acm.org
The Meltdown and Spectre hardware vulnerabilities shocked hardware manufacturers and
system users upon discovery. Numerous attack vectors and mitigations have been …

Cist: A threat modelling approach for hardware supply chain security

B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to
unprecedented level of outsourcing in the hardware supply chain. This has led to the …

One-time programs from commodity hardware

H Eldridge, A Goel, M Green, A Jain… - Theory of Cryptography …, 2022 - Springer
One-time programs, originally formulated by Goldwasser et al., are a powerful cryptographic
primitive with compelling applications. Known solutions for one-time programs, however …

Smile: Secure memory introspection for live enclave

L Zhou, X Ding, F Zhang - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …