Author:
Atamli-Reineh Ahmad,Martin Andrew
Publisher
Springer International Publishing
Reference36 articles.
1. Lecture Notes in Computer Science;SC Misra,2003
2. One, A.: Smashing the stack for fun and profit. Phrack Magazine 7(49), 14–16 (1996)
3. Sullivan, N.: Staying ahead of OpenSSL vulnerabilities – CloudFlare Blog (2014)
4. England, P., Lampson, B., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. Computer 36(7), 55–62 (2003)
5. Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operating Systems Review 42, 2–13 (2008)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05
2. Automotive Safety Systems;Automotive Embedded Systems;2021
3. A survey of Intel SGX and its applications;Frontiers of Computer Science;2020-12-31
4. Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves;EURASIP Journal on Information Security;2019-09-05
5. A Hybrid Approach to Secure Function Evaluation using SGX;Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security;2019-07-02