ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.07450
  4. Cited By
Occlum: Secure and Efficient Multitasking Inside a Single Enclave of
  Intel SGX

Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX

International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2020
21 January 2020
Youren Shen
H. Tian
Yu Chen
Kang Chen
Runji Wang
Yi Xu
Yubin Xia
ArXiv (abs)PDFHTML

Papers citing "Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX"

48 / 48 papers shown
Hazel: Secure and Efficient Disaggregated Storage
Hazel: Secure and Efficient Disaggregated Storage
Marcin Chrapek
Meni Orenbach
Ahmad Atamli
Marcin Copik
Fritz Alder
Torsten Hoefler
Torsten Hoefler
111
0
0
21 Oct 2025
Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs
Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs
Marcin Chrapek
Marcin Copik
Etienne Mettaz
Torsten Hoefler
117
4
0
23 Sep 2025
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection
Honglan Yu
Yibin Wang
Feifei Dai
Dong Liu
Haihui Fan
Xiaoyan Gu
104
0
0
11 Sep 2025
A Secure, Confidential, and Verifiable Decision Support System
A Secure, Confidential, and Verifiable Decision Support System
Edoardo Marangone
E. Nemmi
Daniele Friolo
Giuseppe Ateniese
Ingo Weber
Claudio Di Ciccio
184
0
0
02 Sep 2025
Characterizing Trust Boundary Vulnerabilities in TEE Containers: An Empirical Study
Characterizing Trust Boundary Vulnerabilities in TEE Containers: An Empirical Study
Weijie Liu
H. G. Chen
Shuo Huai
Zhen Xu
W. Wang
Zhi Li
Zheli Liu
Zhi Li
Haixu Tang
Zheli Liu
153
1
0
28 Aug 2025
PrivAR: Real-Time Privacy Protection for Location-Based Augmented Reality Applications
PrivAR: Real-Time Privacy Protection for Location-Based Augmented Reality Applications
Shafizur Rahman Seeam
Ye Zheng
Zhengxiong Li
Yidan Hu
117
0
0
04 Aug 2025
Adaptive and Efficient Dynamic Memory Management for Hardware Enclaves
Adaptive and Efficient Dynamic Memory Management for Hardware EnclavesAnnual Haifa Experimental Systems Conference (AHES), 2025
Vijay Dhanraj
Harpreet Singh Chwarla
Tao Zhang
Daniel Manila
Eric Thomas Schneider
Erica Fu
Mona Vij
Chia-Che Tsai
Donald E. Porter
294
1
0
22 Apr 2025
Practical Secure Aggregation by Combining Cryptography and Trusted Execution Environments
Practical Secure Aggregation by Combining Cryptography and Trusted Execution EnvironmentsDistributed Event-Based Systems (DEBS), 2025
Romain de Laage
Peterson Yuhala
François-Xavier Wicht
Pascal Felber
Christian Cachin
V. Schiavoni
FedML
249
5
0
11 Apr 2025
TEEMATE: Fast and Efficient Confidential Container using Shared Enclave
Chulmin Lee
Jaewon Hur
Sangho Lee
Byoungyoung Lee
FedML
306
1
0
18 Nov 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted
  Execution Environments When Attackers have Pre-Trained Models
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained ModelsACM Transactions on Software Engineering and Methodology (TOSEM), 2024
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
364
12
0
15 Nov 2024
Lightweight, Secure and Stateful Serverless Computing with PSL
Lightweight, Secure and Stateful Serverless Computing with PSL
Alexander Thomas
Shubham Mishra
Kaiyuan Chen
John Kubiatowicz
163
2
0
25 Oct 2024
Confidential Prompting: Privacy-preserving LLM Inference on Cloud
Confidential Prompting: Privacy-preserving LLM Inference on Cloud
Caihua Li
In Gim
Lin Zhong
749
4
0
27 Sep 2024
An Experimental Evaluation of TEE technology Evolution: Benchmarking
  Transparent Approaches based on SGX, SEV, and TDX
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDXComputers & security (Comput. Secur.), 2024
L. Coppolino
S. DÁntonio
Davide Iasio
Giovanni Mazzeo
L. Romano
ELM
156
10
0
01 Aug 2024
SRAS: Self-governed Remote Attestation Scheme for Multi-party
  Collaboration
SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration
Linan Tian
Yunke Shen
Zhiqiang Li
159
1
0
04 Jul 2024
A Survey of Unikernel Security: Insights and Trends from a Quantitative
  Analysis
A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis
Alex Wollman
John D. Hastings
255
3
0
04 Jun 2024
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Supraja Sridhara
Andrin Bertschi
Benedict Schluter
Shweta Shinde
SILM
134
7
0
22 Apr 2024
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing
  in Edge Deployment
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment
Qinfeng Li
Yangfan Xie
Zhiqiang Shen
Yangfan Xie
Xuhong Zhang
Tianyu Du
Jianwei Yin
223
20
0
17 Apr 2024
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNPIEEE Symposium on Security and Privacy (S&P), 2024
Benedict Schluter
Supraja Sridhara
Andrin Bertschi
Shweta Shinde
224
41
0
04 Apr 2024
Heckler: Breaking Confidential VMs with Malicious Interrupts
Heckler: Breaking Confidential VMs with Malicious InterruptsUSENIX Security Symposium (USENIX Security), 2024
Benedict Schluter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
294
47
0
04 Apr 2024
The Road to Trust: Building Enclaves within Confidential VMs
The Road to Trust: Building Enclaves within Confidential VMs
Wenhao Wang
Linke Song
Benshan Mei
Shuang Liu
Shijun Zhao
Shoumeng Yan
XiaoFeng Wang
Dan Meng
Rui Hou
206
8
0
18 Feb 2024
SinClave: Hardware-assisted Singletons for TEEs
SinClave: Hardware-assisted Singletons for TEEsInternational Middleware Conference (Middleware), 2023
Franz Gregor
R. Krahn
D. Quoc
Christof Fetzer
190
0
0
05 Nov 2023
SecV: Secure Code Partitioning via Multi-Language Secure Values
SecV: Secure Code Partitioning via Multi-Language Secure ValuesInternational Middleware Conference (Middleware), 2023
Peterson Yuhala
Pascal Felber
Hugo Guiroux
Jean-Pierre Lozi
A. Tchana
V. Schiavoni
Gaël Thomas
213
5
0
24 Oct 2023
Confidential Consortium Framework: Secure Multiparty Applications with
  Confidentiality, Integrity, and High Availability
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High AvailabilityProceedings of the VLDB Endowment (PVLDB), 2023
Heidi Howard
F. Alder
Edward Ashton
A. Chamayou
S. Clebsch
...
Fotios Kounelis
M. Kuppe
Julien Maffre
M. Russinovich
C. Wintersteiger
821
22
0
17 Oct 2023
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN
  Partition for On-Device ML
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang
Chen Gong
Yifeng Cai
Yuanyuan Yuan
Bingyan Liu
Ding Li
Yao Guo
Xiangqun Chen
FedML
224
52
0
11 Oct 2023
TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms
TGh: A TEE/GC Hybrid Enabling Confidential FaaS PlatformsIACR Cryptology ePrint Archive (IACR ePrint), 2023
James Choncholas
Ketan Bhardwaj
Ada Gavrilovska
FedML
128
3
0
14 Sep 2023
SoK: A Systematic Review of TEE Usage for Developing Trusted
  Applications
SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsARES (ARES), 2023
Arttu Paju
Muhammad Javed
Juha Nurmi
Juha Savimäki
Brian McGillion
B. Brumley
262
35
0
26 Jun 2023
SGX Switchless Calls Made Configless
SGX Switchless Calls Made ConfiglessDependable Systems and Networks (DSN), 2023
Peterson Yuhala
Mic Paper
Timothée Zerbib
Pascal Felber
V. Schiavoni
A. Tchana
215
6
0
01 May 2023
Resilient Consensus Sustained Collaboratively
Resilient Consensus Sustained Collaboratively
Junchao Chen
Suyash Gupta
A. Sonnino
Lefteris Kokoris-Kogias
Mohammad Sadoghi
426
5
0
05 Feb 2023
MeSHwA: The case for a Memory-Safe Software and Hardware Architecture
  for Serverless Computing
MeSHwA: The case for a Memory-Safe Software and Hardware Architecture for Serverless Computing
Anjo Vahldiek-Oberwagner
Mona Vij
212
2
0
15 Nov 2022
Securing Access to Untrusted Services From TEEs with GateKeeper
Securing Access to Untrusted Services From TEEs with GateKeeper
Meni Orenbach
Bar Raveh
Alon Berkenstadt
Yan Michalevsky
Shachar Itzhaky
M. Silberstein
151
3
0
14 Nov 2022
SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas
SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas
Kai-Peng Chen
Alexander Thomas
Han-yu Lu
William Mullen
Jeffery Ichnowski
...
N. Krishnakumar
Ryan Teoh
Willis Wang
A. Joseph
John Kubiatowicz
FedML
211
3
0
21 Oct 2022
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory
  Sharing
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory SharingConference on Computer and Communications Security (CCS), 2022
Dayeol Lee
Kevin Cheang
Alexander Thomas
Catherine Lu
Pranav Gaddamadugu
Anjo Vahldiek-Oberwagner
Mona Vij
Basel Alomair
Sanjit A. Seshia
Krste Asanović
FedML
295
22
0
30 Sep 2022
Machine Learning with Confidential Computing: A Systematization of
  Knowledge
Machine Learning with Confidential Computing: A Systematization of KnowledgeACM Computing Surveys (ACM CSUR), 2022
Fan Mo
Zahra Tarkhani
Hamed Haddadi
431
28
0
22 Aug 2022
A Comprehensive Benchmark Suite for Intel SGX
A Comprehensive Benchmark Suite for Intel SGXIEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), 2022
Sandeep Kumar
Abhisek Panda
S. Sarangi
ELM
157
15
0
13 May 2022
Trusted Container Extensions for Container-based Confidential Computing
Trusted Container Extensions for Container-based Confidential Computing
Ferdinand Brasser
Patrick Jauernig
F. Pustelnik
A. Sadeghi
Emmanuel Stapf
173
17
0
11 May 2022
Computation offloading to hardware accelerators in Intel SGX and Gramine
  Library OS
Computation offloading to hardware accelerators in Intel SGX and Gramine Library OS
Dmitrii Kuvaiskii
G. Kumar
Mona Vij
138
4
0
02 Mar 2022
Dissecting BFT Consensus: In Trusted Components we Trust!
Dissecting BFT Consensus: In Trusted Components we Trust!European Conference on Computer Systems (EuroSys), 2022
Suyash Gupta
Sajjad Rahnama
Shubham Pandey
Natacha Crooks
Mohammad Sadoghi
305
41
0
03 Feb 2022
Trusted And Confidential Program Analysis
Trusted And Confidential Program Analysis
Han Liu
P. Antonino
Zhiqiang Yang
Chao Liu
A. W. Roscoe
154
0
0
01 Dec 2021
Understanding TEE Containers, Easy to Use? Hard to Trust
Understanding TEE Containers, Easy to Use? Hard to Trust
Weijie Liu
Hongbo Chen
Luyi Xing
Zhi Li
Qiang Yan
Wenhao Wang
Haixu Tang
160
12
0
04 Sep 2021
Stockade: Hardware Hardening for Distributed Trusted Sandboxes
Stockade: Hardware Hardening for Distributed Trusted Sandboxes
Joongun Park
Seung-Hyun Kang
Sanghyeon Lee
Taehoon Kim
Jongse Park
Youngjin Kwon
Jaehyuk Huh
176
1
0
26 Aug 2021
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data
  Analytics Framework
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics FrameworkIEEE International Conference on Cloud Computing (CLOUD), 2021
Chathura Widanage
Weijie Liu
Jiayu Li
Hongbo Chen
Luyi Xing
Haixu Tang
Judy Fox
FedML
154
13
0
26 Jul 2021
Citadel: Protecting Data Privacy and Model Confidentiality for
  Collaborative Learning with SGX
Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning with SGXACM Symposium on Cloud Computing (SoCC), 2021
Chengliang Zhang
Junzhe Xia
Baichen Yang
Huancheng Puyang
Wei Wang
Ruichuan Chen
Istemi Ekin Akkus
Paarijaat Aditya
Feng Yan
FedML
231
44
0
04 May 2021
Dynamic Binary Translation for SGX Enclaves
Dynamic Binary Translation for SGX EnclavesACM Transactions on Privacy and Security (ACM TOPS), 2021
Jinhua Cui
Shweta Shinde
Satyaki Sen
Prateek Saxena
Pinghai Yuan
SILM
227
13
0
29 Mar 2021
Towards Efficiently Establishing Mutual Distrust Between Host
  Application and Enclave for SGX
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX
Yuan Chen
Jiaqi Li
Guorui Xu
Yajin Zhou
Zhi Wang
Cong Wang
K. Ren
264
2
0
23 Oct 2020
Elasticlave: An Efficient Memory Model for Enclaves
Elasticlave: An Efficient Memory Model for EnclavesUSENIX Security Symposium (USENIX Security), 2020
Zhijingcheng Yu
Shweta Shinde
Trevor E. Carlson
Prateek Saxena
FedML
195
42
0
16 Oct 2020
S3ML: A Secure Serving System for Machine Learning Inference
S3ML: A Secure Serving System for Machine Learning Inference
Jin Tan
Chaofan Yu
Aihui Zhou
Bingzhe Wu
Xibin Wu
Xingyu Chen
Xiangqun Chen
Lei Wang
Donggang Cao
131
4
0
13 Oct 2020
Binary Compatibility For SGX Enclaves
Binary Compatibility For SGX Enclaves
Shweta Shinde
Jinhua Cui
Satyaki Sen
Pinghai Yuan
Prateek Saxena
SyDa
174
3
0
02 Sep 2020
Confidential Attestation: Efficient in-Enclave Verification of Privacy
  Policy Compliance
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
Weijie Liu
Wenhao Wang
Luyi Xing
Xiaozhu Meng
Yaosong Lu
...
Qingtao Shen
Kai Chen
Haixu Tang
Yi Chen
Luyi Xing
170
2
0
20 Jul 2020
1
Page 1 of 1