ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1706.06261
  4. Cited By
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed

20 June 2017
Huayi Duan
Cong Wang
Xingliang Yuan
Yajin Zhou
Qian Wang
K. Ren
ArXivPDFHTML

Papers citing "LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed"

20 / 20 papers shown
Title
Metadata-private Messaging without Coordination
Metadata-private Messaging without Coordination
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
25
0
0
28 Apr 2025
KeyVisor -- A Lightweight ISA Extension for Protected Key Handles with
  CPU-enforced Usage Policies
KeyVisor -- A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies
Fabian Schwarz
Jan Philipp Thoma
Christian Rossow
Tim Güneysu
21
0
0
02 Oct 2024
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial
  Communication
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
Eric Wagner
David Heye
Martin Serror
Ike Kunze
Klaus Wehrle
Martin Henze
23
1
0
15 Dec 2023
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
Samira Briongos
Ghassan O. Karame
Claudio Soriente
Annika Wilde
21
2
0
04 Oct 2023
SoK: A Systematic Review of TEE Usage for Developing Trusted
  Applications
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
Arttu Paju
Muhammad Javed
Juha Nurmi
Juha Savimäki
Brian McGillion
B. Brumley
6
10
0
26 Jun 2023
SoK: Content Moderation for End-to-End Encryption
SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler
Jonathan R. Mayer
48
22
0
07 Mar 2023
A Survey of Secure Computation Using Trusted Execution Environments
A Survey of Secure Computation Using Trusted Execution Environments
Xiaoguo Li
Bowen Zhao
Guomin Yang
Tao Xiang
J. Weng
R. Deng
29
9
0
23 Feb 2023
Proof of Unlearning: Definitions and Instantiation
Proof of Unlearning: Definitions and Instantiation
Jiasi Weng
Shenglong Yao
Yuefeng Du
Junjie Huang
Jian Weng
Cong Wang
MU
37
12
0
20 Oct 2022
Trusted And Confidential Program Analysis
Trusted And Confidential Program Analysis
Han Liu
P. Antonino
Zhiqiang Yang
Chao Liu
A. W. Roscoe
17
0
0
01 Dec 2021
A Step Towards On-Path Security Function Outsourcing
A Step Towards On-Path Security Function Outsourcing
Jehyun Lee
M. Kang
D. Divakaran
Phyo May Thet
Videet Singhai
Jun Seung You
14
0
0
01 Oct 2021
Towards Efficiently Establishing Mutual Distrust Between Host
  Application and Enclave for SGX
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX
Yuan Chen
Jiaqi Li
Guorui Xu
Yajin Zhou
Zhi Wang
Cong Wang
K. Ren
21
2
0
23 Oct 2020
You foot the bill! Attacking NFC with passive relays
You foot the bill! Attacking NFC with passive relays
Yuyi Sun
Swarun Kumar
Shibo He
Jiming Chen
Zhiguo Shi
12
7
0
21 Jan 2020
Accelerating Forward and Backward Private Searchable Encryption Using
  Trusted Execution
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution
Viet Vo
Shangqi Lai
Xingliang Yuan
Shifeng Sun
Surya Nepal
Joseph K. Liu
FedML
10
23
0
11 Jan 2020
Towards Practical Encrypted Network Traffic Pattern Matching for Secure
  Middleboxes
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai
Xingliang Yuan
Shifeng Sun
Joseph K. Liu
Ron Steinfeld
A. Sakzad
Dongxi Liu
37
14
0
07 Jan 2020
PDoT: Private DNS-over-TLS with TEE Support
PDoT: Private DNS-over-TLS with TEE Support
Yoshimichi Nakatsuka
Andrew Paverd
Gene Tsudik
19
14
0
25 Sep 2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted
  Computing Assistance
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance
Wenhao Wang
Yichen Jiang
Qintao Shen
Weihao Huang
Hao Chen
...
Xiaofeng Wang
Haixu Tang
Kai Chen
Kristin E. Lauter
Dongdai Lin
FedML
15
28
0
19 May 2019
Practical Verifiable In-network Filtering for DDoS defense
Practical Verifiable In-network Filtering for DDoS defense
D. Gong
Muoi Tran
Shweta Shinde
Hao Jin
Vyas Sekar
P. Saxena
M. Kang
9
17
0
04 Jan 2019
Interface-Based Side Channel Attack Against Intel SGX
Interface-Based Side Channel Attack Against Intel SGX
Jinwen Wang
Yueqiang Cheng
Qi Li
Yong-jia Jiang
SILM
AAML
9
20
0
08 Oct 2018
Securing the Storage Data Path with SGX Enclaves
Securing the Storage Data Path with SGX Enclaves
Danny Harnik
Eliad Tsfadia
Doron Chen
Ronen I. Kat
20
20
0
28 Jun 2018
Snort Intrusion Detection System with Intel Software Guard Extension
  (Intel SGX)
Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX)
Dmitrii Kuvaiskii
Somnath Chakrabarti
Mona Vij
18
32
0
01 Feb 2018
1