ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1908.11143
  4. Cited By
SGX-LKL: Securing the Host OS Interface for Trusted Execution
v1v2v3 (latest)

SGX-LKL: Securing the Host OS Interface for Trusted Execution

29 August 2019
Christian Priebe
D. Muthukumaran
Joshua Lind
Huanzhou Zhu
Shujie Cui
V. Sartakov
Peter R. Pietzuch
ArXiv (abs)PDFHTML

Papers citing "SGX-LKL: Securing the Host OS Interface for Trusted Execution"

34 / 34 papers shown
Title
LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3
LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3
Behnam Shobiri
Sajjad Pourali
D. Migault
Ioana Boureanu
Stere Preda
Mohammad Mannan
Amr M. Youssef
8
2
0
21 May 2025
Efficient Storage Integrity in Adversarial Settings
Efficient Storage Integrity in Adversarial Settings
Quinn K. Burke
Ryan Sheatsley
Yohan Beugin
Eric Pauley
Owen Hines
Michael Swift
Patrick McDaniel
58
0
0
09 Apr 2025
Automatic ISA analysis for Secure Context Switching
Automatic ISA analysis for Secure Context Switching
Neelu S. Kalani
Thomas Bourgeat
Guerney D. H. Hunt
W. Ożga
76
0
0
10 Feb 2025
TEE-based Key-Value Stores: a Survey
TEE-based Key-Value Stores: a Survey
Aghiles Ait Messaoud
Sonia Ben Mokhtar
Anthony Simonet-Boulogne
64
0
0
06 Jan 2025
Bridge the Future: High-Performance Networks in Confidential VMs without
  Trusted I/O devices
Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices
Mengyuan Li
Shashvat Srivastava
Mengjia Yan
62
1
0
05 Mar 2024
QuanShield: Protecting against Side-Channels Attacks using
  Self-Destructing Enclaves
QuanShield: Protecting against Side-Channels Attacks using Self-Destructing Enclaves
Shujie Cui
Haohua Li
Yuanhong Li
Zhi Zhang
Lluís Vilanova
Peter Pietzuch
146
0
0
19 Dec 2023
A Comprehensive Trusted Runtime for WebAssembly with Intel SGX
A Comprehensive Trusted Runtime for WebAssembly with Intel SGX
James Ménétrey
Marcelo Pasin
Pascal Felber
V. Schiavoni
Giovanni Mazzeo
Arne Hollum
Darshan Vaydia
113
9
0
14 Dec 2023
SinClave: Hardware-assisted Singletons for TEEs
SinClave: Hardware-assisted Singletons for TEEs
Franz Gregor
R. Krahn
D. Quoc
Christof Fetzer
23
0
0
05 Nov 2023
SecV: Secure Code Partitioning via Multi-Language Secure Values
SecV: Secure Code Partitioning via Multi-Language Secure Values
Peterson Yuhala
Pascal Felber
Hugo Guiroux
Jean-Pierre Lozi
A. Tchana
V. Schiavoni
Gaël Thomas
32
2
0
24 Oct 2023
SoK: A Systematic Review of TEE Usage for Developing Trusted
  Applications
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
Arttu Paju
Muhammad Javed
Juha Nurmi
Juha Savimäki
Brian McGillion
B. Brumley
37
10
0
26 Jun 2023
Montsalvat: Intel SGX Shielding for GraalVM Native Images
Montsalvat: Intel SGX Shielding for GraalVM Native Images
Peterson Yuhala
James Ménétrey
Pascal Felber
V. Schiavoni
A. Tchana
Gaël Thomas
Hugo Guiroux
Jean-Pierre Lozi
55
11
0
01 May 2023
SGX Switchless Calls Made Configless
SGX Switchless Calls Made Configless
Peterson Yuhala
Mic Paper
Timothée Zerbib
Pascal Felber
V. Schiavoni
A. Tchana
58
4
0
01 May 2023
Parma: Confidential Containers via Attested Execution Policies
Parma: Confidential Containers via Attested Execution Policies
Matthew A. Johnson
Stavros Volos
Ken Gordon
S. T. Allen
C. Wintersteiger
S. Clebsch
John Starks
Manuel Costa
39
1
0
08 Feb 2023
Assessing the Impact of Interface Vulnerabilities in Compartmentalized
  Software
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Hugo Lefeuvre
Vlad-Andrei Bădoiu
Yi Chien
Felipe Huici
Nathan Dautenhahn
Pierre Olivier
44
21
0
25 Dec 2022
Securing Access to Untrusted Services From TEEs with GateKeeper
Securing Access to Untrusted Services From TEEs with GateKeeper
Meni Orenbach
Bar Raveh
Alon Berkenstadt
Yan Michalevsky
Shachar Itzhaky
M. Silberstein
54
3
0
14 Nov 2022
Protecting File Activities via Deception for ARM TrustZone
Protecting File Activities via Deception for ARM TrustZone
Liwei Guo
Kaiyang Zhao
Yiying Zhang
F. Lin
46
0
0
22 May 2022
Trusted Container Extensions for Container-based Confidential Computing
Trusted Container Extensions for Container-based Confidential Computing
Ferdinand Brasser
Patrick Jauernig
F. Pustelnik
A. Sadeghi
Emmanuel Stapf
41
13
0
11 May 2022
Dissecting BFT Consensus: In Trusted Components we Trust!
Dissecting BFT Consensus: In Trusted Components we Trust!
Suyash Gupta
Sajjad Rahnama
Shubham Pandey
Natacha Crooks
Mohammad Sadoghi
50
34
0
03 Feb 2022
Confidential Machine Learning Computation in Untrusted Environments: A
  Systems Security Perspective
Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective
Kha Dinh Duy
Taehyun Noh
Siwon Huh
Hojoon Lee
86
9
0
05 Nov 2021
Minimum Viable Device Drivers for ARM TrustZone
Minimum Viable Device Drivers for ARM TrustZone
Liwei Guo
F. Lin
44
20
0
15 Oct 2021
SmashEx: Smashing SGX Enclaves Using Exceptions
SmashEx: Smashing SGX Enclaves Using Exceptions
Jinhua Cui
Jason Yu
Shweta Shinde
Prateek Saxena
Zhiping Cai
SILM
28
39
0
13 Oct 2021
A Step Towards On-Path Security Function Outsourcing
A Step Towards On-Path Security Function Outsourcing
Jehyun Lee
M. Kang
D. Divakaran
Phyo May Thet
Videet Singhai
Jun Seung You
26
0
0
01 Oct 2021
Understanding TEE Containers, Easy to Use? Hard to Trust
Understanding TEE Containers, Easy to Use? Hard to Trust
Weijie Liu
Hongbo Chen
Xiaofeng Wang
Zhi Li
Qiang Yan
Wenhao Wang
Haixu Tang
18
10
0
04 Sep 2021
Stockade: Hardware Hardening for Distributed Trusted Sandboxes
Stockade: Hardware Hardening for Distributed Trusted Sandboxes
Joongun Park
Seung-Hyun Kang
Sanghyeon Lee
Taehoon Kim
Jongse Park
Youngjin Kwon
Jaehyuk Huh
38
1
0
26 Aug 2021
CRC: Fully General Model of Confidential Remote Computing
CRC: Fully General Model of Confidential Remote Computing
Kubilay Ahmet Küçük
Andrew C. Martin
23
1
0
08 Apr 2021
Twine: An Embedded Trusted Runtime for WebAssembly
Twine: An Embedded Trusted Runtime for WebAssembly
James Ménétrey
Marcelo Pasin
Pascal Felber
V. Schiavoni
SyDa
55
60
0
29 Mar 2021
Dynamic Binary Translation for SGX Enclaves
Dynamic Binary Translation for SGX Enclaves
Jinhua Cui
Shweta Shinde
Satyaki Sen
Prateek Saxena
Pinghai Yuan
SILM
49
10
0
29 Mar 2021
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
R. Krahn
Donald Dragoti
Franz Gregor
D. Quoc
V. Schiavoni
Pascal Felber
Clenimar Souza
Andrey Brito
Christof Fetzer
64
17
0
11 Dec 2020
Hector: Using Untrusted Browsers to Provision Web Applications
Hector: Using Untrusted Browsers to Provision Web Applications
David Goltzsche
Tim Siebels
Lennard Golsch
R. Kapitza
36
0
0
19 Oct 2020
Enclave-Aware Compartmentalization and Secure Sharing with Sirius
Enclave-Aware Compartmentalization and Secure Sharing with Sirius
Zahra Tarkhani
Anil Madhavapeddy
16
2
0
03 Sep 2020
Binary Compatibility For SGX Enclaves
Binary Compatibility For SGX Enclaves
Shweta Shinde
Jinhua Cui
Satyaki Sen
Pinghai Yuan
Prateek Saxena
SyDa
11
3
0
02 Sep 2020
Confidential Attestation: Efficient in-Enclave Verification of Privacy
  Policy Compliance
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
Weijie Liu
Wenhao Wang
Xiaofeng Wang
Xiaozhu Meng
Yaosong Lu
...
Qingtao Shen
Kai Chen
Haixu Tang
Yi Chen
Luyi Xing
20
2
0
20 Jul 2020
BAHULAM: Distributed Data Analytics on Secure Enclaves
BAHULAM: Distributed Data Analytics on Secure Enclaves
Srinivasa Rao Aravilli
FedML
6
0
0
20 Apr 2020
Distributed systems and trusted execution environments: Trade-offs and
  challenges
Distributed systems and trusted execution environments: Trade-offs and challenges
Rafael Pires
8
1
0
27 Jan 2020
1