vschiavoni / Sgx Papers
A list of system papers using/about Intel SGX
Stars: ✭ 306
Labels
Projects that are alternatives of or similar to Sgx Papers
PublicWeaklySupervised
(Machine) Learning to Do More with Less
Stars: ✭ 13 (-95.75%)
Mutual labels: paper
Awesome-Computer-Vision-Paper-List
This repository contains all the papers accepted in top conference of computer vision, with convenience to search related papers.
Stars: ✭ 248 (-18.95%)
Mutual labels: paper
Awesome Ehr Deeplearning
Curated list of awesome papers for electronic health records(EHR) mining, machine learning, and deep learning.
Stars: ✭ 269 (-12.09%)
Mutual labels: paper
MoCo
A pytorch reimplement of paper "Momentum Contrast for Unsupervised Visual Representation Learning"
Stars: ✭ 41 (-86.6%)
Mutual labels: paper
Surface Defect Detection
🐎📈 Constantly summarizing open source dataset and important critical papers in the field of surface defect research which are very important. 🐋
Stars: ✭ 287 (-6.21%)
Mutual labels: paper
Glow
Code for reproducing results in "Glow: Generative Flow with Invertible 1x1 Convolutions"
Stars: ✭ 2,859 (+834.31%)
Mutual labels: paper
Summary Of Recommender System Papers
阅读过的推荐系统论文的归类总结,持续更新中…
Stars: ✭ 288 (-5.88%)
Mutual labels: paper
sympy-paper
Repo for the paper "SymPy: symbolic computing in python"
Stars: ✭ 42 (-86.27%)
Mutual labels: paper
GuidedLabelling
Exploiting Saliency for Object Segmentation from Image Level Labels, CVPR'17
Stars: ✭ 35 (-88.56%)
Mutual labels: paper
vehicle-trajectory-prediction
Behavior Prediction in Autonomous Driving
Stars: ✭ 23 (-92.48%)
Mutual labels: paper
Speech Separation Paper Tutorial
A must-read paper for speech separation based on neural networks
Stars: ✭ 288 (-5.88%)
Mutual labels: paper
awesome-internals
A curated list of awesome resources and learning materials in the field of X internals
Stars: ✭ 78 (-74.51%)
Mutual labels: paper
Papernote
paper note, including personal comments, introduction, code etc
Stars: ✭ 268 (-12.42%)
Mutual labels: paper
Tucl
The first-ever paper on the Unix shell written by Ken Thompson in 1976 scanned, transcribed, and redistributed with permission
Stars: ✭ 303 (-0.98%)
Mutual labels: paper
Purpur
Purpur is a fork of Paper, Tuinity, and Airplane with the goal of providing new and interesting configuration options, which allow for creating a unique gameplay experience not seen anywhere else
Stars: ✭ 286 (-6.54%)
Mutual labels: paper
sgx-papers
A curated list of system papers using/about Intel SGX. I'll try to keep this list updated. I gladly accept PRs.
Title | Venue | |
---|---|---|
Using Innovative Instructions to Create Trustworthy Software Solutions | [email protected]'13 | link |
Cooperation and Security Isolation of Library OSes for Multi-Process Applications | EuroSys'14 | link |
Shielding Applications from an Untrusted Cloud with Haven | TOCS'15 | link |
VC3: trustworthy data analytics in the cloud using SGX | S&P'15 | link |
Moat: Verifying Confidentiality of Enclave Programs | CCS'15 | link |
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications | ATC'16 | link |
Exploring the use of Intel SGX for Secure Many-Party Applications | SysTEX'16 | link |
SCONE: Secure Linux Containers with Intel SGX | OSDI'16 | link |
Ryoan: a distributed sandbox for untrusted computation on secret data. | OSDI'16 | link |
SGX Support for Dynamic Memory Management Inside an Enclave | HASP'16 | link |
Secure Content-Based Routing Using Intel Software Guard Extensions | Middleware'16 | link |
SecureKeeper: Confidential ZooKeeper using Intel SGX | Middleware'16 | link |
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves | ESORICS'16 | link |
Eleos: ExitLess OS Services for SGX Enclaves | EuroSys'17 | link |
SGXBounds: Memory Safety for Shielded Execution | EuroSys'17 | link |
Hybrids on Steroids: SGX-Based High Performance BFT | EuroSys'17 | link |
PANOPLY: Low-TCB Linux Applications with SGX Enclaves | NDSS'17 | link |
Teechan: Payment Channels Using Trusted Execution Environments | BITCOIN'17 | link |
SGXIO: Generic Trusted I/O Path for Intel SGX | CODASPY'17 | link |
TrustJS: Trusted Client-side Execution of JavaScript | EuroSec'17 | link |
SGX-Log: Securing System Logs With SGX | Asia CCS'17 | link |
Secure Live Migration of SGX Enclaves on Untrusted Cloud | DSN'17 | link |
Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory | DSN'17 | link |
SecureStreams: Reactive Middleware for Secure Data Stream | DEBS'17 | link |
Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves | ISCA'17 | link |
Glamdring: Automatic Application Partitioning for Intel SGX | ATC'17 | link |
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | Usenix Security'17 | link |
S-NFV: Securing NFV states by using SGX | CODASPY'17 | link |
Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments | NSDI'17 | link |
Securing Data Analytics on SGX With Randomization | ESORICS'17 | link |
Software Grand Exposure: SGX Cache Attacks Are Practical | WooT'17 | link |
Komodo: Using verification to disentangle secure-enclave hardware from software | SOSP'17 | link |
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave | CCS'17 | link |
Iron: Functional Encryption using Intel SGX | CCS'17 | link |
A Formal Foundation for Secure Remote Execution of Enclaves | CCS'17 | link |
SGX-Bomb: Locking Down the Processor via Rowhammer Attack | SysTEX'17 | link |
X-Search: Revisiting Private Web Search using Intel SGX | Middleware'17 | link |
Cache Attacks on Intel SGX | EuroSec'17 | link |
SGXKernel: A Library Operating System Optimized for Intel SGX | CF'17 | link |
Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX | ATC'17 | link |
HardIDX: Practical and Secure Index with SGX | DBSec'17 | link |
VAULT: Reducing Paging Overheads in SGX with Efficient Integrity Verification Structures | ASPLOS'18 | link |
STANlite - a database engine for secure data processing at rack-scale level | IC2E'18 | link |
EnclaveDB: A Secure Database using SGX | SP'18 | link |
Oblix: An Efficient Oblivious Search Index | S&P'18 | link |
ZeroTrace: Oblivious Memory Primitives from Intel SGX | NDSS'18 | link |
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX | NDSS'18 | link |
EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution | DSN'18 | link |
Troxy: Transparent Access to Byzantine Fault-Tolerant Systems | DSN'18 | link |
LibSEAL: Revealing Service Integrity Violations Using Trusted Execution | EuroSys'18 | link |
PESOS: Policy Enhanced Secure Object Store | EuroSys'18 | link |
Bring the Missing Jigsaw Back: TrustedClock for SGX Enclaves | EuroSec'18 | link |
Migrating SGX Enclaves with Persistent State | DSN'18 | link |
SafeBricks: Shielding Network Functions in the Cloud | NSDI'18 | link |
ShieldBox: Secure Middleboxes using Shielded Execution | SOSR'18 | link |
CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions | ICDCS'18 | link |
SGX-Aware Container Orchestration for Heterogeneous Clusters | ICDCS'18 | link |
Varys: Protecting SGX enclaves from practical side-channel attacks | ATC'18 | link |
Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms | SRDS'18 | link |
PubSub-SGX: exploiting Trusted Execution Environments for privacy-preserving publish/subscribe systems | SRDS'18 | link |
sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves | Middleware'18 | link |
EActors: Fast and flexible trusted computing using SGX | Middleware'18 | link |
DelegaTEE: Brokered Delegation Using Trusted Execution Environments | USENIX Security'18 | link |
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution | USENIX Security'18 | link |
Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX) | ISCC'18 | link |
Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card | [email protected]'19 | link |
A Practical Intel SGX Setting for Linux Containers in the Cloud | CODASPY'19 | link |
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing | CODASPY'19 | link |
Everything you should know about Intel SGX performance on virtualized systems | SIGMETRICS'19 | link |
ShieldStore: Shielded In-memory Key-value Storage with SGX | EuroSys'19 | link |
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware | ICLR'19 | link |
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX | NDSS‘19 | link |
Trust more, serverless | SysTor'19 | link |
Clemmys: Towards Secure Remote Execution in FaaS | SysTor'19 | link |
Using Trusted Execution Environments for Secure Stream Processing of Medical Data | DAIS'19 | link |
A Hybrid Approach to Secure Function Evaluation using SGX | AsiaCCS'19 | link |
Secured Routines: Language-based Construction of Trusted Execution Environments | ATC'19 | link |
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX | DSN'19 | link |
Forward and Backward Private Searchable Encryption with SGX | EuroSec'19 | link |
TEE-Perf: A Profiler for Trusted Execution Environments | DSN'19 | link |
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution | EuroS&P'19 | link |
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves: Minimised TCB on secret-code execution with Early Private Mode (EPM) | EURASIP Journal on Information Security | link |
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution | SEC'19 | link |
Towards Memory Safe Enclave Programming with Rust-SGX | CCS'19 | link |
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes | CCS'19 | link |
OPERA: Open Remote Attestation for Intel’s Secure Enclaves | CCS'19 | link |
BLOXY: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains | SRDS'19 | link |
AccTEE: A WebAssembly-based Two-way Sandbox for Trusted Resource Accounting | Middleware'19 | link |
EnclaveCache: A Secure and Scalable Key-value Cache in Multi-tenant Clouds using Intel SGX | Middleware'19 | link |
PrivaTube: Privacy-Preserving Edge-Assisted Video Streaming | Middleware'19 | link |
Teechain: a secure payment network with asynchronous blockchain access | SOSP'19 | link |
Plundervolt: Software-based Fault Injection Attacks against Intel SGX | Oakland '20 | link |
ObliDB: Oblivious Query Processing using Secure Enclaves | VLDB'19 | link |
CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves | USENIX ATC'19 | link |
Computation on Encrypted Data using Dataflow Authentication | PETS'20 | link |
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution | NDSS'20 | link |
COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX | ASPLOS'20 | link |
Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX | ASPLOS'20 | link |
MPTEE: Bringing Flexible and Efficient Memory Protection to Intel SGX | EuroSys'20 | link |
Autarky: Closing controlled channels with self-paging enclaves | EuroSys'20 | link |
Trust management as a service: Enabling trusted execution in the face of Byzantine stakeholders | DSN'20 | link |
SeGShare: Secure Group File Sharing in the Cloud using Enclaves | DSN'20 | link |
Civet: An Efficient Java Partitioning Framework for Hardware Enclaves | SEC'20 | link |
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof | SEC'20 | link |
TEEMon: A continuous performance monitoring framework for TEEs | Middleware'20 | TBA |
Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors | SoCC'20 | link |
PROXIMITEE: Hardened SGX Attestation and Trusted Path through Proximity Verification | CODASPY'20 | link |
Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX | DSD'20 | link |
Formal Foundations for Intel SGX Data Center Attestation Primitives | ICFEM'20 | link |
Unpublished, tech-reports, or open-access:
Title | |
---|---|
Intel SGX Explained | link |
A Blockchain Based on Gossip? – a Position Paper | link |
Proof of Luck: an Efficient Blockchain Consensus Protocol | link |
Malware Guard Extension: Using SGX to Conceal Cache Attacks | link |
Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric | link |
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization | link |
Practical Enclave Malware with Intel SGX | link |
Secure Network Interface with SGX | link |
TaLoS: Secure and Transparent TLS Termination inside SGX Enclaves | link |
Practical Enclave Malware with Intel SGX | link |
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves | link |
HardIDX: Practical and Secure Index with SGX | link |
SGAxe: How SGX Fails in Practice | link |
Secure Processors | Part 1, Part 2 |
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].