Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Trusted execution environments: Applications and organizational challenges

T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022 - frontiersin.org
A lack of trust in the providers is still a major barrier to cloud computing adoption–especially
when sensitive data is involved. While current privacy-enhancing technologies, such as …

Proof of unlearning: Definitions and instantiation

J Weng, S Yao, Y Du, J Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The “Right to be Forgotten” rule in machine learning (ML) practice enables some individual
data to be deleted from a trained model, as pursued by recently developed machine …

Boomerang:{Metadata-Private} Messaging under Hardware Trust

P Jiang, Q Wang, J Cheng, C Wang, L Xu… - … USENIX Symposium on …, 2023 - usenix.org
In end-to-end encrypted (E2EE) messaging systems, protecting communication metadata,
such as who is communicating with whom, at what time, etc., remains a challenging …

Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability

H Howard, F Alder, E Ashton, A Chamayou… - arXiv preprint arXiv …, 2023 - arxiv.org
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …

What is the price for joining securely? benchmarking equi-joins in trusted execution environments

K Maliszewski, JA Quiané-Ruiz, J Traub… - Proceedings of the VLDB …, 2021 - dl.acm.org
Protection of personal data has been raised to be among the top requirements of modern
systems. At the same time, it is now frequent that the owner of the data and the owner of the …

Cracking-Like Join for Trusted Execution Environments

K Maliszewski, JA Quiané-Ruiz, V Markl - Proceedings of the VLDB …, 2023 - dl.acm.org
Data processing on non-trusted infrastructures, such as the public cloud, has become
increasingly popular, despite posing risks to data privacy. However, the existing cloud …

A survey of secure computation using trusted execution environments

X Li, B Zhao, G Yang, T Xiang, J Weng… - arXiv preprint arXiv …, 2023 - arxiv.org
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …

Drivers and barriers for secure hardware adoption across ecosystem stakeholders

A Tomlinson, S Parkin, SA Shaikh - Journal of Cybersecurity, 2022 - academic.oup.com
The decisions involved in choosing technology components for systems are poorly
understood. This is especially so where the choices pertain to system security and …

Secfl: Confidential federated learning using tees

DL Quoc, C Fetzer - arXiv preprint arXiv:2110.00981, 2021 - arxiv.org
Federated Learning (FL) is an emerging machine learning paradigm that enables multiple
clients to jointly train a model to take benefits from diverse datasets from the clients without …