Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
1702.07521
Cited By
Software Grand Exposure: SGX Cache Attacks Are Practical
Workshop on Offensive Technologies (OT), 2017
24 February 2017
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Software Grand Exposure: SGX Cache Attacks Are Practical"
50 / 156 papers shown
IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Sangpyo Kim
Hyesung Ji
Jongmin Kim
Wonseok Choi
Jaiyoung Park
Jung Ho Ahn
65
0
0
01 Dec 2025
Pre-cache: A Microarchitectural Solution to prevent Meltdown and Spectre
Subhash Sethumurugan
Hari Cherupalli
Kangjie Lu
John Sartori
37
0
0
21 Nov 2025
Conditional Recall
Christoph Schlegel
Xinyuan Sun
124
0
0
24 Oct 2025
AEX-NStep: Probabilistic Interrupt Counting Attacks on Intel SGX
Nicolas Dutly
Friederike Groschupp
Ivan Puddu
Kari Kostiainen
Srdjan Capkun
AAML
164
0
0
16 Oct 2025
Leaking Queries On Secure Stream Processing Systems
Hung Pham
Viet Vo
Tien Tuan Anh Dinh
D. Tran
Shuhao Zhang
156
0
0
14 Oct 2025
Language Lives in Sparse Dimensions: Toward Interpretable and Efficient Multilingual Control for Large Language Models
Chengzhi Zhong
Fei Cheng
Qianying Liu
Yugo Murawaki
Chenhui Chu
Sadao Kurohashi
LRM
175
0
0
08 Oct 2025
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation
Jan Wichelmann
Anja Rabich
Anna Pätschke
T. Eisenbarth
162
14
0
23 Sep 2025
Membrane: A Cryptographic Access Control System for Data Lakes
Sam Kumar
Samyukta Yagati
Conor Power
David Culler
Raluca A. Popa
57
0
0
10 Sep 2025
How to Securely Shuffle? A survey about Secure Shufflers for privacy-preserving computations
Marc Damie
Florian Hahn
Andreas Peter
Jan Ramon
FedML
384
1
0
02 Jul 2025
Metadata-private Messaging without Coordination
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
254
1
0
28 Apr 2025
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
Dependable Systems and Networks (DSN), 2025
Nikhilesh Singh
Chester Rebeiro
152
0
0
21 Apr 2025
Reflex: Faster Secure Collaborative Analytics via Controlled Intermediate Result Size Disclosure
Long Gu
Shaza Zeitouni
Carsten Binnig
Zsolt István
137
2
0
26 Mar 2025
TEE-based Key-Value Stores: a Survey
The VLDB journal (VLDB J.), 2024
Aghiles Ait Messaoud
Sonia Ben Mokhtar
Anthony Simonet-Boulogne
200
3
0
06 Jan 2025
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
241
0
0
21 Aug 2024
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads
Aritra Dhar
Clément Thorens
Lara Magdalena Lazier
Lukas Cavigelli
211
3
0
16 Jul 2024
SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration
Linan Tian
Yunke Shen
Zhiqiang Li
137
1
0
04 Jul 2024
BliMe Linter
Hossam ElAtali
Xiaohe Duan
Hans Liljestrand
Meng Xu
N. Asokan
158
0
0
21 Jun 2024
Prime+Retouch: When Cache is Locked and Leaked
Jaehyuk Lee
Fan Sang
Taesoo Kim
217
1
0
23 Feb 2024
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget
Jiankai Jin
C. Chuengsatiansup
Toby C. Murray
Benjamin I. P. Rubinstein
Y. Yarom
Olga Ohrimenko
288
11
0
31 Jan 2024
A Survey of Side-Channel Attacks in Context of Cache -- Taxonomies, Analysis and Mitigation
Ankit Pulkit
Smita Naval
Vijay Laxmi
AAML
144
2
0
18 Dec 2023
Puppy: A Publicly Verifiable Watermarking Protocol
Devris Isler
Seoyeon Hwang
Yoshimichi Nakatsuka
Nikolaos Laoutaris
Gene Tsudik
166
2
0
14 Dec 2023
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures
Moritz Peters
Nicolas Gaudin
Jan Philipp Thoma
Vianney Lapôtre
Pascal Cotret
G. Gogniat
Tim Güneysu
166
8
0
11 Dec 2023
A Tale of Unrealized Hope: Hardware Performance Counter Against Cache Attacks
William Kosasih
292
0
0
17 Nov 2023
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)
Conference on Computer and Communications Security (CCS), 2023
Toby C. Murray
Mukesh Tiwari
G. Ernst
David A. Naumann
245
1
0
07 Sep 2023
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores
Proceedings of the VLDB Endowment (PVLDB), 2023
Leqian Zheng
Lei Xu
Cong Wang
Sheng Wang
Yuke Hu
Zhan Qin
Feifei Li
Kui Ren
234
6
0
29 Jun 2023
Intel TDX Demystified: A Top-Down Approach
ACM Computing Surveys (ACM Comput. Surv.), 2023
P. Cheng
W. Ożga
Enriquillo Valdez
Salman Ahmed
Zhongshu Gu
Hani Jamjoom
Hubertus Franke
James Bottomley
217
93
0
27 Mar 2023
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning
Y. Tang
Kai Li
Yibo Wang
Jiaqi Chen
Cheng Xu
191
0
0
24 Dec 2022
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware
Proceedings on Privacy Enhancing Technologies (PoPETs), 2022
Pengzhi Huang
Thang Hoang
Yueying Li
Elaine Shi
G. E. Suh
341
5
0
18 Oct 2022
Reflections on trusting distributed trust
ACM Workshop on Hot Topics in Networks (HotNets), 2022
Emma Dauterman
Vivian Fang
Natacha Crooks
Raluca A. Popa
357
15
0
14 Oct 2022
CrowdGuard: Federated Backdoor Detection in Federated Learning
Network and Distributed System Security Symposium (NDSS), 2022
Phillip Rieger
T. Krauß
Markus Miettinen
Alexandra Dmitrienko
Ahmad-Reza Sadeghi Technical University Darmstadt
AAML
FedML
323
40
0
14 Oct 2022
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
292
2
0
03 Aug 2022
Mixed Fault Tolerance Protocols with Trusted Execution Environment
Mingyuan Gao
Hung Dang
E. Chang
Jialin Li
75
4
0
03 Aug 2022
PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets
Pengfei Qiu
Yongqiang Lyu
Haixia Wang
Dongsheng Wang
Chang Liu
Qiang Gao
Chunlu Wang
Rihui Sun
Gang Qu
226
3
0
24 Jul 2022
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony
Conference on Advances in Financial Technologies (AFT), 2022
Ouguzhan Ersoy
Jérémie Decouchant
Satwik Prabhu Kimble
Stefanie Roos
219
10
0
23 Jul 2022
DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Micro (MICRO), 2021
H. Hashemi
Yongqin Wang
M. Annavaram
FedML
267
71
0
30 Jun 2022
Designing a Provenance Analysis for SGX Enclaves
Asia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Flavio Toffalini
Mathias Payer
Jianying Zhou
Lorenzo Cavallaro
207
8
0
15 Jun 2022
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
266
13
0
14 Jun 2022
Trusted Container Extensions for Container-based Confidential Computing
Ferdinand Brasser
Patrick Jauernig
F. Pustelnik
A. Sadeghi
Emmanuel Stapf
150
17
0
11 May 2022
Private delegated computations using strong isolation
IEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2022
Mathias Brossard
Guilhem Bryant
Basma El Gaabouri
Xinxin Fan
Alexandre Ferreira
...
Dominic P. Mulligan
Nick Spinale
Eric van Hensbergen
Hugo J. M. Vincent
Shale Xiong
143
7
0
06 May 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Network and Distributed System Security Symposium (NDSS), 2022
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
497
6
0
20 Apr 2022
SoK: TEE-assisted Confidential Smart Contract
Proceedings on Privacy Enhancing Technologies (PoPETs), 2022
Rujia Li
Qin Wang
Qi Wang
D. Galindo
M. Ryan
236
46
0
16 Mar 2022
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Zhihao Yao
S. Talebi
M. Chen
A. A. Sani
Thomas Anderson
159
1
0
15 Mar 2022
DECLOAK: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network
IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Qian Ren
Yuekao Li
Yingjun Wu
Yuchen Wu
Hong Lei
Lei Wang
Bangdao Chen
209
12
0
21 Feb 2022
OLIVE: Oblivious Federated Learning on Trusted Execution Environment against the risk of sparsification
Proceedings of the VLDB Endowment (PVLDB), 2022
Fumiyuki Kato
Yang Cao
Masatoshi Yoshikawa
FedML
276
10
0
15 Feb 2022
CacheFX: A Framework for Evaluating Cache Security
ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2022
Daniel Genkin
William Kosasih
Fangfei Liu
Anna Trikalinou
Thomas Unterluggauer
Y. Yarom
163
22
0
27 Jan 2022
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Zach Smith
H. Jonker
S. Mauw
Hyunwoo Lee
84
0
0
21 Jan 2022
Secure Remote Attestation with Strong Key Insulation Guarantees
IEEE transactions on computers (IEEE Trans. Comput.), 2022
Deniz Gurevin
Chenglu Jin
Phuong Ha Nguyen
O. Khan
Marten van Dijk
155
7
0
05 Jan 2022
Attack of the Knights: A Non Uniform Cache Side-Channel Attack
Asia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Farabi Mahmud
Sungkeun Kim
H. Chawla
Chia-Che Tsai
Eun Jung Kim
A. Muzahid
257
2
0
19 Dec 2021
Automated Side Channel Analysis of Media Software with Manifold Learning
Yuanyuan Yuan
Qi Pang
Shuai Wang
AAML
256
20
0
09 Dec 2021
Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective
IEEE Access (IEEE Access), 2021
Kha Dinh Duy
Taehyun Noh
Siwon Huh
Hojoon Lee
360
11
0
05 Nov 2021
1
2
3
4
Next
Page 1 of 4