ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.13598
  4. Cited By
A Survey of Published Attacks on Intel SGX

A Survey of Published Attacks on Intel SGX

24 June 2020
Alexander Nilsson
Pegah Nikbakht Bideh
Joakim Brorsson
ArXivPDFHTML

Papers citing "A Survey of Published Attacks on Intel SGX"

29 / 29 papers shown
Title
Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments
Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments
Daniel Hugenroth
Mario Lins
René Mayrhofer
A. Beresford
19
0
0
05 May 2025
On Model Protection in Federated Learning against Eavesdropping Attacks
On Model Protection in Federated Learning against Eavesdropping Attacks
Dipankar Maity
Kushal Chakrabarti
FedML
72
0
0
02 Apr 2025
Flash: A Hybrid Private Inference Protocol for Deep CNNs with High Accuracy and Low Latency on CPU
Flash: A Hybrid Private Inference Protocol for Deep CNNs with High Accuracy and Low Latency on CPU
H. Roh
Jinsu Yeo
Yeongil Ko
Gu-Yeon Wei
David Brooks
Woo-Seok Choi
89
2
0
20 Jan 2025
ExclaveFL: Providing Transparency to Federated Learning using Exclaves
ExclaveFL: Providing Transparency to Federated Learning using Exclaves
Jinnan Guo
Kapil Vaswani
Andrew Paverd
Peter R. Pietzuch
FedML
77
0
0
13 Dec 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted
  Execution Environments When Attackers have Pre-Trained Models
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
41
2
0
15 Nov 2024
ParTEETor: A System for Partial Deployments of TEEs within Tor
ParTEETor: A System for Partial Deployments of TEEs within Tor
Rachel King
Quinn K. Burke
Yohan Beugin
Blaine Hoak
Kunyang Li
Eric Pauley
Ryan Sheatsley
Patrick McDaniel
28
0
0
26 Aug 2024
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and
  Future Directions
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
51
1
0
21 Aug 2024
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy
  Cryptocurrency Wallets with TEEs
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs
Lulu Zhou
Zeyu Liu
Fan Zhang
Michael K. Reiter
24
0
0
23 Jul 2024
Hiding Your Awful Online Choices Made More Efficient and Secure: A New
  Privacy-Aware Recommender System
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Shibam Mukherjee
Roman Walch
Fredrik Meisingseth
Elisabeth Lex
Christian Rechberger
16
0
0
30 May 2024
Optimistic Verifiable Training by Controlling Hardware Nondeterminism
Optimistic Verifiable Training by Controlling Hardware Nondeterminism
Megha Srivastava
Simran Arora
Dan Boneh
52
5
0
14 Mar 2024
zkLogin: Privacy-Preserving Blockchain Authentication with Existing
  Credentials
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
Foteini Baldimtsi
K. Chalkias
Yan Ji
Jonas Lindstrøm
Deepak Maram
Ben Riva
Arnab Roy
Mahdi Sedaghat
Joy Wang
24
17
0
22 Jan 2024
Decentralised, Scalable and Privacy-Preserving Synthetic Data Generation
Decentralised, Scalable and Privacy-Preserving Synthetic Data Generation
Vishal Ramesh
Rui Zhao
Naman Goel
34
1
0
30 Oct 2023
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN
  Partition for On-Device ML
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang
Chen Gong
Yifeng Cai
Yuanyuan Yuan
Bingyan Liu
Ding Li
Yao Guo
Xiangqun Chen
FedML
37
16
0
11 Oct 2023
SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection
  in Trusted Execution Environments
SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments
A. M. Alam
Justin Boyce
Keke Chen
16
0
0
12 Aug 2023
Making Your Program Oblivious: a Comparative Study for Side-channel-safe
  Confidential Computing
Making Your Program Oblivious: a Comparative Study for Side-channel-safe Confidential Computing
A. M. Alam
Keke Chen
FedML
18
8
0
12 Aug 2023
Remote attestation of SEV-SNP confidential VMs using e-vTPMs
Remote attestation of SEV-SNP confidential VMs using e-vTPMs
Vikram Narayanan
Claudio Carvalho
Angelo Ruocco
Gheorghe Almási
James Bottomley
Mengmei Ye
Tobin Feldman-Fitzthum
Daniele Buono
Hubertus Franke
A. Burtsev
18
21
0
29 Mar 2023
SoK: Content Moderation for End-to-End Encryption
SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler
Jonathan R. Mayer
53
23
0
07 Mar 2023
Verifiable Fully Homomorphic Encryption
Verifiable Fully Homomorphic Encryption
Alexander Viand
Christian Knabenhans
Anwar Hithnawi
32
38
0
17 Jan 2023
Partially Trusting the Service Mesh Control Plane
Partially Trusting the Service Mesh Control Plane
C. Adam
Abdulhamid A. Adebayo
Hubertus Franke
E. Snible
Tobin Feldman-Fitzthum
James Cadden
Nerla Jean-Louis
16
1
0
23 Oct 2022
CoVault: A Secure Analytics Platform
CoVault: A Secure Analytics Platform
Roberta De Viti
Isaac Sheff
Noemi Glaeser
Baltasar Dinis
Rodrigo Rodrigues
Bobby Bhattacharjee
Anwar Hithnawi
Deepak Garg
P. Druschel
30
0
0
07 Aug 2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine
  Model Agreement
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
A. Shamis
Peter R. Pietzuch
Antoine Delignat-Lavaud
Andrew Paverd
Manuel Costa
OOD
14
0
0
31 May 2022
A Survey of Layer-Two Blockchain Protocols
A Survey of Layer-Two Blockchain Protocols
Ankit Gangwal
Haripriya Ravali Gangavalli
Apoorva Thirupathi
29
108
0
17 Apr 2022
GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution
  Environments
GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments
M. Morbitzer
B. Kopf
Philipp Zieris
8
8
0
15 Feb 2022
OLIVE: Oblivious Federated Learning on Trusted Execution Environment
  against the risk of sparsification
OLIVE: Oblivious Federated Learning on Trusted Execution Environment against the risk of sparsification
Fumiyuki Kato
Yang Cao
Masatoshi Yoshikawa
FedML
37
5
0
15 Feb 2022
Secure Remote Attestation with Strong Key Insulation Guarantees
Secure Remote Attestation with Strong Key Insulation Guarantees
Deniz Gurevin
Chenglu Jin
Phuong Ha Nguyen
O. Khan
Marten van Dijk
18
4
0
05 Jan 2022
STAR: Secret Sharing for Private Threshold Aggregation Reporting
STAR: Secret Sharing for Private Threshold Aggregation Reporting
Alex Davidson
Peter Snyder
E. B. Quirk
Joseph C. Genereux
B. Livshits
Hamed Haddadi
48
15
0
21 Sep 2021
RansomClave: Ransomware Key Management using SGX
RansomClave: Ransomware Key Management using SGX
Alpesh Bhudia
Dan O'Keeffe
D. Sgandurra
D. Hurley-Smith
18
5
0
20 Jul 2021
Off-chain Execution and Verification of Computationally Intensive Smart
  Contracts
Off-chain Execution and Verification of Computationally Intensive Smart Contracts
Emrah Sariboz
Kartick Kolachala
Gaurav Panwar
Roopa Vishwanathan
Satyajayant Misra
OffRL
16
6
0
19 Apr 2021
Speculative Dereferencing of Registers:Reviving Foreshadow
Speculative Dereferencing of Registers:Reviving Foreshadow
Martin Schwarzl
T. Schuster
Michael Schwarz
Daniel Gruss
SILM
13
11
0
05 Aug 2020
1