Sno | Title | Publication | File | Slide | Video | Source |
---|---|---|---|---|---|---|
1 | OpenSGX: An Open Platform for SGX Research | NDSS ’16 | ||||
2 | PANOPLY: Low-TCB Linux Applications with SGX Enclaves | NDSS'17 | PANOPLY | panoply-slide | video | github |
3 | T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs | NDSS'17 | TSGX | T-SGX-slide | video | |
4 | SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs | NDSS'17 | SGX-Shield | slide | video | |
5 | Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu | ASIA CCS ’17 | slide | |||
6 | SGX-Log: Securing System Logs With SGX | ASIA CCS'17 | ||||
7 | The Circle Game: Scalable Private Membership Test Using Trusted Hardware | ASIA CCS'17 | ||||
8 | TrustJS: Trusted Client-side Execution of JavaScript | EUROSEC 17 | ||||
9 | Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory | DSN '17. | ||||
10 | Secure Live Migration of SGX Enclaves on Untrusted Cloud | DSN '17. | [pdf](to appear) | |||
11 | Secure Tera-scale Data Crunching with a Small TCB | DSN '17 | ||||
12 | Teechan: Payment Channels Using Trusted Execution Environments | BITCOIN'17 | ||||
13 | SCONE: Secure Linux Containers with Intel SGX | OSDI'16 | ||||
14 | Ryoan: a distributed sandbox for untrusted computation on secret data | OSDI'16 | ||||
15 | VC3: Trustworthy Data Analytics in the Cloud using SGX | S&P'15 | ||||
16 | Using Innovative Instructions to Create Trustworthy Software Solutions | HASP@ISCA'13 | ||||
17 | Cooperation and Security Isolation of Library OSes for Multi-Process Applications | EuroSys'14 | ||||
18 | Eleos: ExitLess OS Services for SGX Enclaves | EuroSys'17 | ||||
19 | SGXBOUNDS: Memory Safety for Shielded Execution | EuroSys'17 | ||||
20 | Hybrids on Steroids: SGX-Based High Performance BFT | EuroSys'17 | ||||
21 | SGX Support for Dynamic Memory Management Inside an Enclave | HASP'16 | ||||
22 | Secure Content-Based Routing Using Intel Software Guard Extensions | Middleware'16 | ||||
23 | SecureKeeper: Confidential ZooKeeper using Intel SGX | Middleware'16 | ||||
24 | AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves | ESORICS'16 | ||||
25 | SGXIO: Generic Trusted I/O Path for Intel SGX | CODASPY'17 | ||||
26 | Shielding Applications from anUntrusted Cloud with Haven | OSDI '14 | ||||
27 | Moat: Verifying Confidentiality of Enclave Programs | CCS’15 | ||||
28 | Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | USENIX | ||||
29 | Software Grand Exposure- SGX Cache Attacks Are Practical |
Title | Venue | |
---|---|---|
Intel SGX Explained | link | |
A Blockchain Based on Gossip? – a Position Paper | link | |
Proof of Luck: an Efficient Blockchain Consensus Protocol | link | |
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | link | |
SGX Secure Enclaves in Practice: Security and Crypto Review | BlackHat 2016 |
Title | Video |
---|---|
Stanford Seminar - Intel Software Guard Extensions | link |
Title | Venue | |
---|---|---|
Malware Guard Extension: Using SGX to Conceal Cache Attacks | ||
The Design of Malware on Modern Hardware |
#Projects
Title | Link |
---|---|
Securing storage encryption | https://github.com/ayeks/TresorSGX |