Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Twine: An embedded trusted runtime for webassembly
WebAssembly is an Increasingly popular lightweight binary instruction format, which can be
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …
efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others …
Securetf: A secure tensorflow framework
DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey
S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
Citadel: Protecting data privacy and model confidentiality for collaborative learning
Many organizations own data but have limited machine learning expertise (data owners). On
the other hand, organizations that have expertise need data from diverse sources to train …
the other hand, organizations that have expertise need data from diverse sources to train …
Dissecting bft consensus: In trusted components we trust!
The growing interest in reliable multi-party applications has fostered widespread adoption of
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …
Byzantine Fault-Tolerant (bft) consensus protocols. Existing bft protocols need f more …
TEEMon: A continuous performance monitoring framework for TEEs
Trusted Execution Environments (TEEs), such as Intel Software Guard eXtensions (SGX),
are considered as a promising approach to resolve security challenges in clouds. TEEs …
are considered as a promising approach to resolve security challenges in clouds. TEEs …
Trustworthy confidential virtual machines for the masses
A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …
cloud provider from their trusted computing base and resolves their disincentive to migrate …
TEE-based decentralized recommender systems: The raw data sharing redemption
A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs
J Ménétrey, A Grüter, P Yuhala, J Oeftiger… - … on Principles of …, 2024 - drops.dagstuhl.de
Publish/subscribe systems play a key role in enabling communication between numerous
devices in distributed and large-scale architectures. While widely adopted, securing such …
devices in distributed and large-scale architectures. While widely adopted, securing such …