Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2006.13598
Cited By
A Survey of Published Attacks on Intel SGX
24 June 2020
Alexander Nilsson
Pegah Nikbakht Bideh
Joakim Brorsson
Re-assign community
ArXiv
PDF
HTML
Papers citing
"A Survey of Published Attacks on Intel SGX"
29 / 29 papers shown
Title
Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments
Daniel Hugenroth
Mario Lins
René Mayrhofer
A. Beresford
19
0
0
05 May 2025
On Model Protection in Federated Learning against Eavesdropping Attacks
Dipankar Maity
Kushal Chakrabarti
FedML
72
0
0
02 Apr 2025
Flash: A Hybrid Private Inference Protocol for Deep CNNs with High Accuracy and Low Latency on CPU
H. Roh
Jinsu Yeo
Yeongil Ko
Gu-Yeon Wei
David Brooks
Woo-Seok Choi
89
2
0
20 Jan 2025
ExclaveFL: Providing Transparency to Federated Learning using Exclaves
Jinnan Guo
Kapil Vaswani
Andrew Paverd
Peter R. Pietzuch
FedML
77
0
0
13 Dec 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
41
2
0
15 Nov 2024
ParTEETor: A System for Partial Deployments of TEEs within Tor
Rachel King
Quinn K. Burke
Yohan Beugin
Blaine Hoak
Kunyang Li
Eric Pauley
Ryan Sheatsley
Patrick McDaniel
28
0
0
26 Aug 2024
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
51
1
0
21 Aug 2024
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs
Lulu Zhou
Zeyu Liu
Fan Zhang
Michael K. Reiter
24
0
0
23 Jul 2024
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Shibam Mukherjee
Roman Walch
Fredrik Meisingseth
Elisabeth Lex
Christian Rechberger
16
0
0
30 May 2024
Optimistic Verifiable Training by Controlling Hardware Nondeterminism
Megha Srivastava
Simran Arora
Dan Boneh
52
5
0
14 Mar 2024
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
Foteini Baldimtsi
K. Chalkias
Yan Ji
Jonas Lindstrøm
Deepak Maram
Ben Riva
Arnab Roy
Mahdi Sedaghat
Joy Wang
24
17
0
22 Jan 2024
Decentralised, Scalable and Privacy-Preserving Synthetic Data Generation
Vishal Ramesh
Rui Zhao
Naman Goel
34
1
0
30 Oct 2023
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang
Chen Gong
Yifeng Cai
Yuanyuan Yuan
Bingyan Liu
Ding Li
Yao Guo
Xiangqun Chen
FedML
37
16
0
11 Oct 2023
SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments
A. M. Alam
Justin Boyce
Keke Chen
16
0
0
12 Aug 2023
Making Your Program Oblivious: a Comparative Study for Side-channel-safe Confidential Computing
A. M. Alam
Keke Chen
FedML
18
8
0
12 Aug 2023
Remote attestation of SEV-SNP confidential VMs using e-vTPMs
Vikram Narayanan
Claudio Carvalho
Angelo Ruocco
Gheorghe Almási
James Bottomley
Mengmei Ye
Tobin Feldman-Fitzthum
Daniele Buono
Hubertus Franke
A. Burtsev
18
21
0
29 Mar 2023
SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler
Jonathan R. Mayer
53
23
0
07 Mar 2023
Verifiable Fully Homomorphic Encryption
Alexander Viand
Christian Knabenhans
Anwar Hithnawi
32
38
0
17 Jan 2023
Partially Trusting the Service Mesh Control Plane
C. Adam
Abdulhamid A. Adebayo
Hubertus Franke
E. Snible
Tobin Feldman-Fitzthum
James Cadden
Nerla Jean-Louis
16
1
0
23 Oct 2022
CoVault: A Secure Analytics Platform
Roberta De Viti
Isaac Sheff
Noemi Glaeser
Baltasar Dinis
Rodrigo Rodrigues
Bobby Bhattacharjee
Anwar Hithnawi
Deepak Garg
P. Druschel
30
0
0
07 Aug 2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
A. Shamis
Peter R. Pietzuch
Antoine Delignat-Lavaud
Andrew Paverd
Manuel Costa
OOD
14
0
0
31 May 2022
A Survey of Layer-Two Blockchain Protocols
Ankit Gangwal
Haripriya Ravali Gangavalli
Apoorva Thirupathi
29
108
0
17 Apr 2022
GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments
M. Morbitzer
B. Kopf
Philipp Zieris
8
8
0
15 Feb 2022
OLIVE: Oblivious Federated Learning on Trusted Execution Environment against the risk of sparsification
Fumiyuki Kato
Yang Cao
Masatoshi Yoshikawa
FedML
37
5
0
15 Feb 2022
Secure Remote Attestation with Strong Key Insulation Guarantees
Deniz Gurevin
Chenglu Jin
Phuong Ha Nguyen
O. Khan
Marten van Dijk
18
4
0
05 Jan 2022
STAR: Secret Sharing for Private Threshold Aggregation Reporting
Alex Davidson
Peter Snyder
E. B. Quirk
Joseph C. Genereux
B. Livshits
Hamed Haddadi
48
15
0
21 Sep 2021
RansomClave: Ransomware Key Management using SGX
Alpesh Bhudia
Dan O'Keeffe
D. Sgandurra
D. Hurley-Smith
18
5
0
20 Jul 2021
Off-chain Execution and Verification of Computationally Intensive Smart Contracts
Emrah Sariboz
Kartick Kolachala
Gaurav Panwar
Roopa Vishwanathan
Satyajayant Misra
OffRL
16
6
0
19 Apr 2021
Speculative Dereferencing of Registers:Reviving Foreshadow
Martin Schwarzl
T. Schuster
Michael Schwarz
Daniel Gruss
SILM
13
11
0
05 Aug 2020
1