Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the CloudMengmei YeAngelo Ruoccoet al.2023CLOUD 2023
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable AssumptionsRomain GayBogdan Ursu2024PKC 2024
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy AggregationPau-Chen ChengKevin Eykholtet al.2024EuroSys 2024
Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEsChrysoula StathakopoulouSigne Rüschet al.2021SRDS 2021
TZ4Fabric: Executing Smart Contracts with ARM TrustZone : Experience Report)Christina MullerMarcus Brandenburgeret al.2020SRDS 2020