A verified confidential computing as a service framework for privacy preservation
As service providers are moving to the cloud, users are forced to provision sensitive data to
the cloud. Confidential computing leverages hardware Trusted Execution Environment …
the cloud. Confidential computing leverages hardware Trusted Execution Environment …
AGORA: Open More and Trust Less in Binary Verification Service
Binary verification plays a pivotal role in software security, yet building a verification service
that is both open and trustworthy poses a formidable challenge. In this paper, we introduce a …
that is both open and trustworthy poses a formidable challenge. In this paper, we introduce a …
TCS Security Analysis in Intel SGX Enclave MultiThreading
T Zhang, X Cui, Y Wang, Y Du… - … on Networking and …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet Technology in recent years, the demand for security
support for complex applications is becoming stronger and stronger. Intel Software Guard …
support for complex applications is becoming stronger and stronger. Intel Software Guard …
DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines
In recent years, there has been a rise in the use of confidential computing as a new
computing paradigm that enables privacy-preserving computation on sensitive and …
computing paradigm that enables privacy-preserving computation on sensitive and …
Check for ACDroid: Detecting Collusion Applications on Smart Devices Ning Xi, Yihuan He, Yuchen Zhang (), Zhi Wang, and Pengbin Feng School of Cyber …
N Xi, Y He - Science of Cyber Security: 5th International …, 2023 - books.google.com
With the continuous innovation of artificial intelligence technology, more and more smart
devices are being applied to emerging industrial Internet and IOT (Internet of Things) …
devices are being applied to emerging industrial Internet and IOT (Internet of Things) …
Romeo: SGX-Based Software Anti-piracy Framework
Y Du, X Song, Y Wang - International Conference on Security and Privacy …, 2022 - Springer
Preventing software piracy has always been a concern of software developers. Since
crackers can track and analyze the application code, any client-side anti-piracy mechanism …
crackers can track and analyze the application code, any client-side anti-piracy mechanism …
Check for updates Romeo: SGX-Based Software Anti-piracy Framework
Y Du, X Song, Y Wang - Security and Privacy in New Computing …, 2023 - books.google.com
Preventing software piracy has always been a concern of software developers. Since
crackers can track and analyze the application code, any clientside anti-piracy mechanism …
crackers can track and analyze the application code, any clientside anti-piracy mechanism …