Academic literature on the topic 'Intel Software Guard eXtensions (SGX)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intel Software Guard eXtensions (SGX).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intel Software Guard eXtensions (SGX)"
Fei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Full textAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Full textYoon, HanJae, and ManHee Lee. "SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory." Applied Sciences 12, no. 15 (July 29, 2022): 7655. http://dx.doi.org/10.3390/app12157655.
Full textWoo, Sangyeon, Jeho Song, and Sungyong Park. "A Distributed Oracle Using Intel SGX for Blockchain-Based IoT Applications." Sensors 20, no. 9 (May 10, 2020): 2725. http://dx.doi.org/10.3390/s20092725.
Full textSelo, Omar Abou, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, and Qutaibah Malluhi. "Private Function Evaluation Using Intel’s SGX." Security and Communication Networks 2020 (September 15, 2020): 1–10. http://dx.doi.org/10.1155/2020/3042642.
Full textZhang, Denghui, and Zhaoquan Gu. "A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX." Wireless Communications and Mobile Computing 2021 (March 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/6660709.
Full textYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (June 25, 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Full textYoon, Hyundo, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, and Junbeom Hur. "SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search." Applied Sciences 10, no. 21 (November 5, 2020): 7842. http://dx.doi.org/10.3390/app10217842.
Full textWu, Tsu-Yang, Liyang Wang, Xinglan Guo, Yeh-Cheng Chen, and Shu-Chuan Chu. "SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing." Sustainability 14, no. 17 (September 5, 2022): 11054. http://dx.doi.org/10.3390/su141711054.
Full textWu, Tsu-Yang, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, and Chien-Ming Chen. "SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing." Symmetry 14, no. 7 (July 6, 2022): 1393. http://dx.doi.org/10.3390/sym14071393.
Full textDissertations / Theses on the topic "Intel Software Guard eXtensions (SGX)"
Cardoso, Rodrigo Martins. "Blockchain-based Storage with SGX Clients for Mobile Games." Master's thesis, 2020. http://hdl.handle.net/10362/107383.
Full textNos últimos anos, muitos jogos multijogador para telemóveis com um grande número de utilizadores tornaram-se populares e um excelente exemplo disso é o Pokémon GO. Estes jogos de escala planetária são verdadeiros desafios de engenharia que obrigam a uma arquitetura descentralizada para dar suporte ao tráfego de milhares de jogadores. Os recentes e contínuos avanços tecnológicos dos dispositivos móveis permitem construir smartphones com um poder de computação, armazenamento e processamento gráfico cada vez maiores e melhores, o que atrai um exorbitante número de jogadores/utilizadores a nível global. Ao combinar todas as funcionalidades disponíveis neste tipo de aparelhos (ecrã táctil, sensor de movimento, sistema de localização preciso, entre outros) com a ligação ubíqua à rede são possíveis jogos online ligados ao movimento do dispositivo, jogos multijogador, jogos baseados em localização e lojas de aplicações. Com todas estas capacidades unidas, os jogos de telemóveis inteligentes fornecem uma experiência distinta aos utilizadores e abrem um horizonte de possibilidades não exploradas. Com a expansão do número base de utilizadores móveis, proliferação de smartphones e tablets e o aumento do interesse em jogos móveis multijogador, uma crescente demanda por serviços, tecnologias e arquiteturas para dar suporte a jogos wireless, surge inevitavelmente para dar resposta à dificuldade de suportar de forma centralizada tais jogos de massiva escala. Como uma solução inovadora para esta procura, foi desenhado um modelo que permite a clientes móveis comunicarem com fortes garantias, para suportar carteiras/moedas virtuais, através de transações diretas com outros com confiança e sem a necessidade de uma entidade central reguladora. Para este fim, o sistema pensado é composto por uma rede peer-to-peer onde os clientes utilizam novas extensões presentes nos novos processadores Intel a partir da sexta geração: as Intel Software Guard Extensions. Ao confiar no cliente, que executa de forma isolada código em hardware seguro, é esperado um sistema transacional mais escalável e mais rápido na produção de transações do que os tradicionais atuais.
Book chapters on the topic "Intel Software Guard eXtensions (SGX)"
Keerup, Kalmer, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. "Privacy-Preserving Analytics, Processing and Data Management." In Big Data in Bioeconomy, 157–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_12.
Full textLeslie-Hurd, Rebekah, Dror Caspi, and Matthew Fernandez. "Verifying Linearizability of Intel® Software Guard Extensions." In Computer Aided Verification, 144–60. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21668-3_9.
Full textGupta, Debayan, Benjamin Mood, Joan Feigenbaum, Kevin Butler, and Patrick Traynor. "Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation." In Financial Cryptography and Data Security, 302–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_20.
Full textLiang, Xueping, Sachin Shetty, Deepak Tosh, Peter Foytik, and Lingchen Zhang. "Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions." In Information and Communications Security, 304–10. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_27.
Full textConference papers on the topic "Intel Software Guard eXtensions (SGX)"
Chakrabarti, Somnath, Matthew Hoekstra, Dmitrii Kuvaiskii, and Mona Vij. "Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card." In HASP '19: Workshop on Hardware and Architectural Support for Security and Privacy. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3337167.3337173.
Full textXing, Bin Cedric, Mark Shanahan, and Rebekah Leslie-Hurd. "Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave." In the Hardware and Architectural Support for Security and Privacy 2016. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2948618.2954330.
Full textValadares, Dalton Cezane Gomes, Matteus Sthefano Leite da Silva, Andrey Elisio Monteiro Brito, and Ewerton Monteiro Salvador. "Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538590.
Full textMcKeen, Frank, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, and Carlos Rozas. "Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave." In the Hardware and Architectural Support for Security and Privacy 2016. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2948618.2954331.
Full textChakrabarti, Somnath, Rebekah Leslie-Hurd, Mona Vij, Frank McKeen, Carlos Rozas, Dror Caspi, Ilya Alexandrovich, and Ittai Anati. "Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment." In the Hardware and Architectural Support for Security and Privacy. New York, New York, USA: ACM Press, 2017. http://dx.doi.org/10.1145/3092627.3092634.
Full textPires, Rafael Pereira, Pascal Felber, and Marcelo Pasin. "Distributed systems and trusted execution environments: Trade-offs and challenges." In XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12412.
Full textWill, Newton C., Tiago Heinrich, Amanda B. Viescinski, and Carlos A. Maziero. "A Trusted Message Bus Built on Top of D-Bus." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19236.
Full textAbdurahiman, Nihal, Ahmad Qadeib alban, abdullatif shikfa, and Qutaibah Malluhi. "Private Function Evaluation Using Intel’s SGX." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0246.
Full textSchunter, Matthias. "Intel Software Guard Extensions." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995306.2995307.
Full textPires, Rafael, Marcelo Pasin, Pascal Felber, and Christof Fetzer. "Secure Content-Based Routing Using Intel Software Guard Extensions." In Middleware '16: 17th International Middleware Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2988336.2988346.
Full text