Abstract is missing.
- Architectures for Enhancing Authentication Privacy and Security using Trusted ComputingRanjbar A. Balisane, Ravishankar Borgaonkar, Ahmad Atamli-Reineh, Andrew Martin. [doi]
- SGX-Bomb: Locking Down the Processor via Rowhammer AttackYeongjin Jang, Jae-Hyuk Lee, Sangho Lee, Taesoo Kim. [doi]
- vCFI: Visible Control Flow Integrity for Cloud TenantsYuan Li, Chao Zhang, Xiapu Luo. [doi]
- Cobweb: Practical Remote Attestation Using Contextual GraphsFrank Wang, Yuna Joung, James Mickens. [doi]
- Scaling Databases through Trusted Hardware ProxiesKai Mast, Lequn Chen, Emin Gün Sirer. [doi]
- Hardening Intel SGX Applications: Balancing ConcernsKobe Vrancken, Frank Piessens, Raoul Strackx. [doi]
- Strongly Secure and Efficient Data Shuffle on Hardware EnclavesJu Chen, Yuzhe Richard Tang, Hao Zhou. [doi]
- SGX-Step: A Practical Attack Framework for Precise Enclave Execution ControlJo Van Bulck, Frank Piessens, Raoul Strackx. [doi]
- Challenges For Scaling Applications Across EnclavesJethro G. Beekman, Donald E. Porter. [doi]
- Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information: Information Leakage and CountermeasuresMarcus Völp, Jérémie Decouchant, Christoph Lambert, Maria Fernandes, Paulo Jorge Esteves Veríssimo. [doi]