Author:
Kang Dee Meng,Faahym Haadee,Meftah Souhail,Keoh Sye Loong,Khin Mi Mi Aung
Publisher
Springer Nature Switzerland
Reference26 articles.
1. Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z., Lai, T.: SGXPectre: stealing Intel secrets from SGX enclaves via speculative execution. In: Proceedings of the IEEE European Symposium on Security and Privacy, pp. 142–157 (2019)
2. Choi, H., Bajic, I.: Deep feature compression for collaborative object detection. In: Proceedings of the Twenty-Fifth IEEE International Conference on Image Processing, pp. 3743–3747 (2018)
3. Costan, V., Lebedev, L., Devadas, S.: Secure processors. Part II: Intel SGX security analysis and MIT Sanctum architecture, Foundations and Trends in Electronic Design Automation 11(3), 249–361 (2017)
4. Deis Labs, Mystikos, GitHub (https://github.com/deislabs/mystikos) (2023)
5. Fei, S., Yan, Z., Ding, W., Xie, H.: Security vulnerabilities of SGX and countermeasures: a survey. ACM Comput. Surv. 54(6), 126 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fine-tuned EfficientNet and MobileNetV2 Models for Intel Images Classification;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01