Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Private web search with Tiptoe
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …
of documents, while revealing no information about their search query to the search engine's …
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
Securetf: A secure tensorflow framework
DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
These applications are usually hosted in the untrusted cloud computing infrastructure. This …
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
Intel SGX is a hardware-based trusted execution environment (TEE), which enables an
application to compute on confidential data in a secure enclave. SGX assumes a powerful …
application to compute on confidential data in a secure enclave. SGX assumes a powerful …
Bringing decentralized search to decentralized services
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …
services and blockchain apps: the lack of decentralized, verifiable, and private search …
TEE-based decentralized recommender systems: The raw data sharing redemption
A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
Anonymous and confidential file sharing over untrusted clouds
Using public cloud services for storing and sharing confidential data requires end users to
cryptographically protect both the data and the access to the data. In some cases, the …
cryptographically protect both the data and the access to the data. In some cases, the …
MISO: legacy-compatible privacy-preserving single sign-on using trusted execution environments
Single sign-on (SSO) allows users to authenticate to third-party applications through a
central identity provider. Despite their wide adoption, deployed SSO systems suffer from …
central identity provider. Despite their wide adoption, deployed SSO systems suffer from …
EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …
for many systems to improve throughput and reduce latency, cloud caches have been widely …