Integration of blockchain and auction models: A survey, some applications, and challenges
In recent years, blockchain has gained widespread attention as an emerging technology for
decentralization, transparency, and immutability in advancing online activities over public …
decentralization, transparency, and immutability in advancing online activities over public …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while keeping their code and data secret, and ensuring the …
computations in the cloud while keeping their code and data secret, and ensuring the …
[PDF][PDF] Panoply: Low-TCB Linux Applications With SGX Enclaves.
Intel SGX, a new security capability in emerging CPUs, allows user-level application code to
execute in hardwareisolated enclaves. Enclave memory is isolated from all other software …
execute in hardwareisolated enclaves. Enclave memory is isolated from all other software …
{ROTE}: Rollback protection for trusted execution
Security architectures such as Intel SGX need protection against rollback attacks, where the
adversary violates the integrity of a protected application state by replaying old persistently …
adversary violates the integrity of a protected application state by replaying old persistently …
Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation
Exploiting memory disclosure vulnerabilities like the HeartBleed bug may cause arbitrary
reading of a victim's memory, leading to leakage of critical secrets such as crypto keys …
reading of a victim's memory, leading to leakage of critical secrets such as crypto keys …
Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric
A smart contract on a blockchain cannot keep a secret because its data is replicated on all
nodes in a network. To remedy this problem, it has been suggested to combine blockchains …
nodes in a network. To remedy this problem, it has been suggested to combine blockchains …
Engraft: Enclave-guarded Raft on Byzantine faulty nodes
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
Narrator: Secure and practical state continuity for trusted execution in the cloud
Public cloud platforms have leveraged Trusted Execution Environment (TEE) technology to
provide confidential computing services. However, TEE-protected applications still suffer …
provide confidential computing services. However, TEE-protected applications still suffer …
Ariadne: A minimal approach to state continuity
R Strackx, F Piessens - 25th USENIX Security Symposium (USENIX …, 2016 - usenix.org
Protected-module architectures such as Intel SGX provide strong isolation guarantees to
sensitive parts of applications while the system is up and running. Unfortunately systems in …
sensitive parts of applications while the system is up and running. Unfortunately systems in …
[PDF][PDF] Keystone: A framework for architecting tees
Trusted execution environments (TEEs) are becoming a requirement across a wide range of
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …