


default search action
2nd SysTEX@SOSP 2017: Shanghai, China
- Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, Shanghai, China, October 28, 2017. ACM 2017, ISBN 978-1-4503-5097-6

- Ju Chen, Yuzhe Richard Tang, Hao Zhou:

Strongly Secure and Efficient Data Shuffle on Hardware Enclaves. 1:1-1:6 - Kobe Vrancken, Frank Piessens, Raoul Strackx:

Hardening Intel SGX Applications: Balancing Concerns. 2:1-2:2 - Frank Wang, Yuna Joung, James Mickens:

Cobweb: Practical Remote Attestation Using Contextual Graphs. 3:1-3:7 - Jo Van Bulck

, Frank Piessens, Raoul Strackx:
SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. 4:1-4:6 - Yeongjin Jang, Jae-Hyuk Lee, Sangho Lee, Taesoo Kim:

SGX-Bomb: Locking Down the Processor via Rowhammer Attack. 5:1-5:6 - Yuan Li

, Chao Zhang, Xiapu Luo
:
vCFI: Visible Control Flow Integrity for Cloud Tenants. 6:1-6:2 - Marcus Völp

, Jérémie Decouchant
, Christoph Lambert, Maria Fernandes
, Paulo Jorge Esteves Veríssimo:
Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information: Information Leakage and Countermeasures. 7:1-7:6 - Jethro G. Beekman, Donald E. Porter:

Challenges For Scaling Applications Across Enclaves. 8:1-8:2 - Kai Mast, Lequn Chen

, Emin Gün Sirer:
Scaling Databases through Trusted Hardware Proxies. 9:1-9:6 - Ranjbar A. Balisane, Ravishankar Borgaonkar

, Ahmad Atamli-Reineh, Andrew Martin:
Architectures for Enhancing Authentication Privacy and Security using Trusted Computing. 10:1-10:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














