Mr-TEE

Author:

Van Eyck Tom1ORCID,Trimech Hamdi1ORCID,Michiels Sam1ORCID,Hughes Danny1ORCID,Salehi Majid2ORCID,Janjuaa Hassan1ORCID,Ta Thanh-Liem3ORCID

Affiliation:

1. DistriNet, KU Leuven, Leuven, Belgium

2. Nokia Bell Labs, Antwerp, Belgium

3. Polytech Sorbonne, Paris, France

Funder

Horizon 2020 Framework Programme

KU Leuven

Agentschap Innoveren en Ondernemen

Publisher

ACM

Reference29 articles.

1. Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves

2. S The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things

3. Raad Bahmani , Ferdinand Brasser , Ghada Dessouky , Patrick Jauernig , Matthias Klimmek , Ahmad-Reza Sadeghi , and Emmanuel Stapf . 2021 . CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1073--1090. Retrieved from https://www.usenix.org/conference/usenixsecurity21/presentation/bahmani Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1073--1090. Retrieved from https://www.usenix.org/conference/usenixsecurity21/presentation/bahmani

4. Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 991--1008. Retrieved from https.//www.usenix.org/conference/usenixsecurity18/presentation/bulck Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 991--1008. Retrieved from https.//www.usenix.org/conference/usenixsecurity18/presentation/bulck

5. Eric J Byres , Matthew Franz , and Darrin Miller . 2004 . The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems . In Proceedings of the International Infrastructure Survivability Workshop. Citeseer, 3--10 . Eric J Byres, Matthew Franz, and Darrin Miller. 2004. The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems. In Proceedings of the International Infrastructure Survivability Workshop. Citeseer, 3--10.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3