共 50 条
- [21] Leveraging Intel SGX Technology to Protect Security-Sensitive Applications [J]. 2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
- [22] Plundervolt: Software-based Fault Injection Attacks against Intel SGX [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1466 - 1482
- [24] Exploring the use of Intel SGX for Secure Many-Party Applications [J]. SYSTEX 2016: 1ST WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, 2016,
- [25] A comparative analysis of emerging approaches for securing java']java software with Intel SGX [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 620 - 633
- [26] SGXoMeter: Open and Modular Benchmarking for Intel SGX [J]. PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 55 - 61
- [27] Switchless Calls Made Practical in Intel SGX [J]. PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 22 - 27
- [28] SecureKeeper: Confidential ZooKeeper using Intel SGX [J]. MIDDLEWARE '16: PROCEEDINGS OF THE 17TH INTERNATIONAL MIDDLEWARE CONFERENCE, 2016,
- [29] Isolating Operating System Components with Intel SGX [J]. SYSTEX 2016: 1ST WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, 2016,
- [30] Benchmarking the Second Generation of Intel SGX Hardware [J]. 18TH INTERNATIONAL WORKSHOP ON DATA MANAGEMENT ON NEW HARDWARE, DAMON 2022, 2022,