{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}
Intel SGX hardware enables applications to protect themselves from potentially-malicious
OSes or hypervisors. In cloud computing and other systems, many users and applications …
OSes or hypervisors. In cloud computing and other systems, many users and applications …
{SCONE}: Secure linux containers with intel {SGX}
S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016 - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Occlum: Secure and efficient multitasking inside a single enclave of intel sgx
Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …
regions called enclaves, whose code and data are protected by the CPU from software and …
{vTZ}: Virtualizing {ARM}{TrustZone}
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
Modeling the driving-point characteristic of resistive interconnect for accurate delay estimation
PR O'Brien, TL Savarino - The Best of ICCAD: 20 Years of Excellence in …, 2003 - Springer
In recent years, on-chip interconnect has had an increasingly important impact on overall
system performance. Much work has been done to develop algorithms which can efficiently …
system performance. Much work has been done to develop algorithms which can efficiently …
Secloak: Arm trustzone-based mobile peripheral control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
{BlackBox}: a container security monitor for protecting containers on untrusted operating systems
A Van't Hof, J Nieh - 16th USENIX Symposium on Operating Systems …, 2022 - usenix.org
Containers are widely deployed to package, isolate, and multiplex applications on shared
computing infrastructure, but rely on the operating system to enforce their security …
computing infrastructure, but rely on the operating system to enforce their security …