A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems
Smart contracts are regarded as one of the most promising and appealing notions in
blockchain technology. Their self-enforcing and event-driven features make some online …
blockchain technology. Their self-enforcing and event-driven features make some online …
Zexe: Enabling decentralized private computation
Ledger-based systems that support rich applications often suffer from two limitations. First,
validating a transaction requires re-executing the state transition that it attests to. Second …
validating a transaction requires re-executing the state transition that it attests to. Second …
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …
devices are increasingly used in daily life or industry. To reduce costs related to the time …
A survey of published attacks on Intel SGX
Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to
run code and operate sensitive data. SGX provides runtime hardware protection where both …
run code and operate sensitive data. SGX provides runtime hardware protection where both …
Autarky: Closing controlled channels with self-paging enclaves
As the first widely-deployed secure enclave hardware, Intel SGX shows promise as a
practical basis for confidential cloud computing. However, side channels remain SGX's …
practical basis for confidential cloud computing. However, side channels remain SGX's …
Mptee: bringing flexible and efficient memory protection to intel sgx
Intel Software Guard extensions (SGX), a hardware-based Trusted Execution Environment
(TEE), has become a promising solution to stopping critical threats such as insider attacks …
(TEE), has become a promising solution to stopping critical threats such as insider attacks …
The price of Meltdown and Spectre: Energy overhead of mitigations at operating system level
B Herzog, S Reif, J Preis… - Proceedings of the 14th …, 2021 - dl.acm.org
The Meltdown and Spectre hardware vulnerabilities shocked hardware manufacturers and
system users upon discovery. Numerous attack vectors and mitigations have been …
system users upon discovery. Numerous attack vectors and mitigations have been …
Cist: A threat modelling approach for hardware supply chain security
B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to
unprecedented level of outsourcing in the hardware supply chain. This has led to the …
unprecedented level of outsourcing in the hardware supply chain. This has led to the …
One-time programs from commodity hardware
One-time programs, originally formulated by Goldwasser et al., are a powerful cryptographic
primitive with compelling applications. Known solutions for one-time programs, however …
primitive with compelling applications. Known solutions for one-time programs, however …
Smile: Secure memory introspection for live enclave
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …