Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution

G Chen, S Chen, Y Xiao, Y Zhang… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …

Opera: Open remote attestation for intel's secure enclaves

G Chen, Y Zhang, TH Lai - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Intel Software Guard Extensions (SGX) remote attestation enables enclaves to authenticate
hardware inside which they run, and attest the integrity of their enclave memory to the …

SGX-aware container orchestration for heterogeneous clusters

S Vaucher, R Pires, P Felber, M Pasin… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Containers are becoming the de facto standard to package and deploy applications and
micro-services in the cloud. Several cloud providers (eg, Amazon, Google, Microsoft) begin …

A distributed oracle using intel sgx for blockchain-based iot applications

S Woo, J Song, S Park - Sensors, 2020 - mdpi.com
A blockchain oracle problem is a problem that defines a mechanism for how to safely bring
external data to the blockchain. Although there have been various research efforts to solve …

Fidelius: Protecting user secrets from compromised browsers

S Eskandarian, J Cogan, S Birnbaum… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Users regularly enter sensitive data, such as passwords, credit card numbers, or tax
information, into the browser window. While modern browsers provide powerful client-side …

{HyperEnclave}: An open and cross-platform trusted execution environment

Y Jia, S Liu, W Wang, Y Chen, Z Zhai, S Yan… - 2022 USENIX Annual …, 2022 - usenix.org
A number of trusted execution environments (TEEs) have been proposed by both academia
and industry. However, most of them require specific hardware or firmware changes and are …

[PDF][PDF] VoiceGuard: Secure and Private Speech Processing.

F Brasser, T Frassetto, K Riedhammer, AR Sadeghi… - Interspeech, 2018 - encrypto.de
With the advent of smart-home devices providing voice-based interfaces, such as Amazon
Alexa or Apple Siri, voice data is constantly transferred to cloud services for automated …

Secured routines: Language-based construction of trusted execution environments

A Ghosn, JR Larus, E Bugnion - 2019 USENIX Annual Technical …, 2019 - usenix.org
Trusted Execution Environments (TEEs), such as Intel SGX's enclave, use hardware to
ensure the confidentiality and integrity of operations on sensitive data. While the technology …

Privacy-preserving genotype imputation in a trusted execution environment

N Dokmai, C Kockan, K Zhu, XF Wang, SC Sahinalp… - Cell systems, 2021 - cell.com
Genotype imputation is an essential tool in genomics research, whereby missing genotypes
are inferred using reference genomes to enhance downstream analyses. Recently, public …

Civet: An efficient java partitioning framework for hardware enclaves

CC Tsai, J Son, B Jain, J McAvey, RA Popa… - 29th USENIX Security …, 2020 - usenix.org
Hardware enclaves are designed to execute small pieces of sensitive code or to operate on
sensitive data, in isolation from larger, less trusted systems. Partitioning a large, legacy …