From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the CloudMengmei YeAngelo Ruoccoet al.2023CLOUD 2023
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable AssumptionsRomain GayBogdan Ursu2024PKC 2024
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy AggregationPau-Chen ChengKevin Eykholtet al.2024EuroSys 2024
Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEsChrysoula StathakopoulouSigne Rüschet al.2021SRDS 2021
TZ4Fabric: Executing Smart Contracts with ARM TrustZone : Experience Report)Christina MullerMarcus Brandenburgeret al.2020SRDS 2020
Trusted computing meets blockchain: Rollback attacks and a solution for hyperledger fabricMarcus BrandenburgerChristian Cachinet al.2019SRDS 2019