暂无分享,去创建一个
Shujie Cui | Huanzhou Zhu | Peter Pietzuch | Vasily A. Sartakov | Joshua Lind | Christian Priebe | Divya Muthukumaran | Joshua Lind | Christian Priebe | D. Muthukumaran | P. Pietzuch | Shujie Cui | Huanzhou Zhu | V. Sartakov
[1] Donald E. Porter,et al. Rethinking the library OS from the top down , 2011, ASPLOS XVI.
[2] David Wolinsky,et al. Dissent in Numbers: Making Strong Anonymity Scale , 2012, OSDI.
[3] Qi Li,et al. Interface-Based Side Channel Attack Against Intel SGX , 2018, ArXiv.
[4] Emmett Witchel,et al. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data , 2016, OSDI.
[5] Ming Zhang,et al. Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[6] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[7] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[8] Nickolai Zeldovich,et al. Stadium: A Distributed Metadata-Private Messaging System , 2017, IACR Cryptol. ePrint Arch..
[9] P. Pavlou,et al. Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .
[10] David Thomas,et al. The Art in Computer Programming , 2001 .
[11] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[12] Donald E. Porter,et al. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX , 2017, USENIX Annual Technical Conference.
[13] Lorenzo Alvisi,et al. Obladi: Oblivious Serializable Transactions in the Cloud , 2018, OSDI.
[14] Frank Piessens,et al. A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes , 2019, CCS.
[15] Rüdiger Kapitza,et al. AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves , 2016, ESORICS.
[16] Srdjan Capkun,et al. Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.
[17] Daniel Gruss,et al. ZombieLoad: Cross-Privilege-Boundary Data Sampling , 2019, CCS.
[18] Dan Boneh,et al. Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.
[19] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[20] Kai Li,et al. The PARSEC benchmark suite: Characterization and architectural implications , 2008, 2008 International Conference on Parallel Architectures and Compilation Techniques (PACT).
[21] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[23] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[24] Tanakorn Leesatapornwongsa,et al. What Bugs Live in the Cloud? A Study of 3000+ Issues in Cloud Systems , 2014, SoCC.
[25] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[26] Dan J. Kim,et al. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2019 .
[27] Emin Gün Sirer,et al. Eluding carnivores: file sharing with strong anonymity , 2004, EW 11.
[28] Christopher W. Fletcher,et al. ZeroTrace : Oblivious Memory Primitives from Intel SGX , 2018, NDSS.
[29] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[30] Dongdai Lin,et al. Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[31] Kyungtae Kim,et al. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX , 2018, NDSS.
[32] Nicolae Tapus,et al. LKL: The Linux kernel library , 2010, 9th RoEduNet IEEE International Conference.
[33] Matei Zaharia,et al. ObliDB: Oblivious Query Processing using Hardware Enclaves , 2017 .
[34] N. Asokan,et al. Trusted execution environments on mobile devices , 2013, CCS.
[35] Srdjan Capkun,et al. DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization , 2019, ACSAC.
[36] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[37] Tao Zhang,et al. dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices , 2017, APSys.
[38] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2010, ACM Trans. Inf. Syst. Secur..
[39] Srdjan Capkun,et al. DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization , 2017, ArXiv.
[40] Dawn Song,et al. Keystone: An Open Framework for Architecting TEEs , 2019 .
[41] Aniket Kate,et al. AnoA: A Framework for Analyzing Anonymous Communication Protocols , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[42] Johannes Götzfried,et al. Cache Attacks on Intel SGX , 2017, EUROSEC.
[43] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[44] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[45] Rishabh Poddar,et al. Oblix: An Efficient Oblivious Search Index , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[46] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[47] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[48] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[49] Sarvar Patel,et al. CacheShuffle: A Family of Oblivious Shuffles , 2018, ICALP.
[50] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[51] Dawn Xiaodong Song,et al. Keystone: A Framework for Architecting TEEs , 2019, ArXiv.
[52] Paul Francis,et al. Towards efficient traffic-analysis resistant anonymity networks , 2013, SIGCOMM.
[53] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[54] Ashay Rane,et al. Raccoon: Closing Digital Side-Channels through Obfuscated Execution , 2015, USENIX Security Symposium.
[55] Chunhua Su,et al. Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space , 2016, ATIS.
[56] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[57] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[58] Sadie Creese,et al. Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[59] Srinath T. V. Setty,et al. Unobservable Communication over Fully Untrusted Infrastructure , 2016, OSDI.
[60] Christof Fetzer,et al. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks , 2018, USENIX ATC.
[61] Shweta Shinde,et al. Panoply: Low-TCB Linux Applications With SGX Enclaves , 2017, NDSS.
[62] Brent Byunghoon Kang,et al. Hacking in Darkness: Return-oriented Programming against Secure Enclaves , 2017, USENIX Security Symposium.
[63] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[64] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[65] Úlfar Erlingsson,et al. Prochlo: Strong Privacy for Analytics in the Crowd , 2017, SOSP.
[66] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[67] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[68] Gorka Irazoqui Apecechea,et al. CacheZoom: How SGX Amplifies The Power of Cache Attacks , 2017, CHES.
[69] Nickolai Zeldovich,et al. Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.
[70] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[71] Mauro Conti,et al. The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX , 2018, USENIX Security Symposium.
[72] Nuria Oliver,et al. HealthGear: a real-time wearable system for monitoring and analyzing physiological signals , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[73] Jun Yang,et al. H-ORAM: A Cacheable ORAM Interface for Efficient 1/O Accesses , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[74] Matei Zaharia,et al. An Oblivious General-Purpose SQL Database for the Cloud , 2017, ArXiv.
[75] Ιωάννης Σόφιος,et al. Trusted execution environment , 2017 .
[76] Hovav Shacham,et al. Iago attacks: why the system call API is a bad untrusted RPC interface , 2013, ASPLOS '13.