Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Private web search with Tiptoe

A Henzinger, E Dauterman, H Corrigan-Gibbs… - Proceedings of the 29th …, 2023 - dl.acm.org
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Securetf: A secure tensorflow framework

DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …

COIN attacks: On insecurity of enclave untrusted interfaces in SGX

MR Khandaker, Y Cheng, Z Wang, T Wei - Proceedings of the Twenty …, 2020 - dl.acm.org
Intel SGX is a hardware-based trusted execution environment (TEE), which enables an
application to compute on confidential data in a secure enclave. SGX assumes a powerful …

Bringing decentralized search to decentralized services

M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel… - … USENIX} Symposium on …, 2021 - usenix.org
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …

TEE-based decentralized recommender systems: The raw data sharing redemption

A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …

Anonymous and confidential file sharing over untrusted clouds

S Contiu, S Vaucher, R Pires, M Pasin… - … 38th Symposium on …, 2019 - ieeexplore.ieee.org
Using public cloud services for storing and sharing confidential data requires end users to
cryptographically protect both the data and the access to the data. In some cases, the …

MISO: legacy-compatible privacy-preserving single sign-on using trusted execution environments

R Xu, S Yang, F Zhang, Z Fang - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Single sign-on (SSO) allows users to authenticate to third-party applications through a
central identity provider. Despite their wide adoption, deployed SSO systems suffer from …

EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX

L Chen, J Li, R Ma, H Guan, HA Jacobsen - Proceedings of the 20th …, 2019 - dl.acm.org
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …