Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Chex-mix: Combining homomorphic encryption with trusted execution environments for two-party oblivious inference in the cloud
D Natarajan, A Loveless, W Dai… - Cryptology ePrint …, 2021 - eprint.iacr.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …
applications. But, there exists an underlying tension: users wish to keep their data private …
DDQN-TS: A novel bi-objective intelligent scheduling algorithm in the cloud environment
Z Tong, F Ye, B Liu, J Cai, J Mei - Neurocomputing, 2021 - Elsevier
Task scheduling has always been one of the crucial problem in cloud computing. With the
transition of task types from static batch processing to dynamic stream processing, the …
transition of task types from static batch processing to dynamic stream processing, the …
Secure attack detection framework for hierarchical 6G-enabled internet of vehicles
H Sedjelmaci, N Kaaniche… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Sixth Generation Heterogeneous Network (6G HetNet) is a global interconnected
system that serves a myriad variety of applications and services across multiple domains …
system that serves a myriad variety of applications and services across multiple domains …
A mutation-enabled proactive defense against service-oriented man-in-the-middle attack in kubernetes
T Ma, C Xu, S Yang, Y Huang, Q An… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Kubernetes (K8s) has become a core technology for cloud-native applications. However, a
design flaw of the external IP in K8s leads to the service-oriented man-in-the-middle attack …
design flaw of the external IP in K8s leads to the service-oriented man-in-the-middle attack …
Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis
Intel SGX is a promising TEE technique that can protect programs running in user space
from being maliciously accessed by the host operating system. Although it provides …
from being maliciously accessed by the host operating system. Although it provides …
Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data
J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …
[HTML][HTML] HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE
Abstract Outsourcing Machine Learning (ML) tasks to cloud servers is a cost-effective
solution when dealing with distributed data. However, outsourcing these tasks to cloud …
solution when dealing with distributed data. However, outsourcing these tasks to cloud …
vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash
Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for
computation to be performed on ciphertext without the need for decryption. FHE will thus …
computation to be performed on ciphertext without the need for decryption. FHE will thus …
CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud
D Natarajan, A Loveless, W Dai… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …
applications. But, there exists an underlying tension: users wish to keep their data private …