{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}

CC Tsai, DE Porter, M Vij - 2017 USENIX Annual Technical Conference …, 2017 - usenix.org
Intel SGX hardware enables applications to protect themselves from potentially-malicious
OSes or hypervisors. In cloud computing and other systems, many users and applications …

{SCONE}: Secure linux containers with intel {SGX}

S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016 - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017 - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Occlum: Secure and efficient multitasking inside a single enclave of intel sgx

Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …

{vTZ}: Virtualizing {ARM}{TrustZone}

Z Hua, J Gu, Y Xia, H Chen, B Zang… - 26th USENIX Security …, 2017 - usenix.org
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Modeling the driving-point characteristic of resistive interconnect for accurate delay estimation

PR O'Brien, TL Savarino - The Best of ICCAD: 20 Years of Excellence in …, 2003 - Springer
In recent years, on-chip interconnect has had an increasingly important impact on overall
system performance. Much work has been done to develop algorithms which can efficiently …

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

{BlackBox}: a container security monitor for protecting containers on untrusted operating systems

A Van't Hof, J Nieh - 16th USENIX Symposium on Operating Systems …, 2022 - usenix.org
Containers are widely deployed to package, isolate, and multiplex applications on shared
computing infrastructure, but rely on the operating system to enforce their security …