Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Twine: An embedded trusted runtime for webassembly

J Ménétrey, M Pasin, P Felber… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
WebAssembly is an Increasingly popular lightweight binary instruction format, which can be
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …

Securetf: A secure tensorflow framework

DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Citadel: Protecting data privacy and model confidentiality for collaborative learning

C Zhang, J Xia, B Yang, H Puyang, W Wang… - Proceedings of the …, 2021 - dl.acm.org
Many organizations own data but have limited machine learning expertise (data owners). On
the other hand, organizations that have expertise need data from diverse sources to train …

Dissecting bft consensus: In trusted components we trust!

S Gupta, S Rahnama, S Pandey, N Crooks… - Proceedings of the …, 2023 - dl.acm.org
The growing interest in reliable multi-party applications has fostered widespread adoption of
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …

TEEMon: A continuous performance monitoring framework for TEEs

R Krahn, D Dragoti, F Gregor, DL Quoc… - Proceedings of the 21st …, 2020 - dl.acm.org
Trusted Execution Environments (TEEs), such as Intel Software Guard eXtensions (SGX),
are considered as a promising approach to resolve security challenges in clouds. TEEs …

Trustworthy confidential virtual machines for the masses

A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …

TEE-based decentralized recommender systems: The raw data sharing redemption

A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …

A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs

J Ménétrey, A Grüter, P Yuhala, J Oeftiger… - … on Principles of …, 2024 - drops.dagstuhl.de
Publish/subscribe systems play a key role in enabling communication between numerous
devices in distributed and large-scale architectures. While widely adopted, securing such …