-
82篇关于软件测试的英文原文论文
资源介绍
Alansari2017- A Distributed Access Control System for Cloud Federations .pdf
Anon2017-Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.pdf
Arnautov2016- SCONE Secure Linux Containers with Intel SGX.pdf
Atamli-Reineh2015 - Securing Application with Software Partitioning.pdf
B2017 -Securing Data Analytics on SGX With.pdf
Bahmani2016 - Secure Multiparty Computation from SGX.pdf
Barbosa2016- Foundations of Hardware-Based Attested Computation and Application to SGX.pdf
Bauman2016-A Case for Protecting Computer Games With SGX.pdf
Baumann2014- Shielding applications from an untrusted cloud with Haven-haven.pdf
Beekman2016- Attestation Transparency Building secure Internet.pdf
BehlJDistlerT2017-Hybrids on Steroids-SGX-Based High Performance BFT∗.pdf
Bhardwaj2016-Fast, scalable and secure onloading of edge functions using AirBox.pdf
Boneh2017 - Surnaming Schemes, Fast Verification, and Applications to SGX Technology.pdf
Brekalo2016-Mitigating Password Database Breaches with Intel SGX.pdf
Brenner2017- Secure Cloud Micro Services Using Intel SGX.pdf
CacheZoom - how sgx amplifies the power of cache attacks.pdf
ChakrabartiSLeslie-HurdRVijM -Architecture for Oversubscription of Secure Memory.pdf
ChakrabartiSLeslie-HurdRVijM-Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment .pdf
Choi2017 - S-OpenSGX A system-level platform.pdf
Costan2016-Sanctum Minimal Hardware Extensions for Strong Software.pdf
Coughlin2017 -Trusted Click-Overcoming Security issues of NFV in the Cloud.pdf
Dang2017-Proofs of Data Residency-Checking whether Your Cloud Files Have Been Relocated .pdf
Elastic and Secure Energy Forecasting in cloud environments.pdf
Fetzer2016-Building Critical Applications Using Microservice.pdf
Gkantsidis2017- And Then There Were More.pdf
Glamdring-Automatic Application Partitioning for Intel SGX.pdf
Glimmers-Resolving the Privacy-Trust Quagmire.pdf
Gotzfried2017-Cache Attacks on Intel SGX.pdf
Gu2017 - Secure Live Migration of SGX Enclaves on Trusted Cloud.pdf
Haider2017- Leveraging hw isolation for Process L (2).pdf
Han2017-SGX-Box Enabling Visibility on Encrypted Traffic.pdf
Hunt2016-Ryoan- A Distributed Sandbox for Untrusted .pdf
Hutchison2011-HardIDX_ Practical and Secure Index with SGX.pdf
Iron - Functional Encryption using Intel SGX.pdf
Jackson2017 -Trust is in the Keys of the Beholder.pdf
Jacomme2017 - Symbolic Models for Isolated Execution Environments.pdf
KarandeVBaumanELinZ2017-SGX-Log-Securing System Logs With SGX.pdf
Kelbert2017 - SecureCloud Secure Big Data Processing in Untrusted Clouds.pdf
Leaky Cauldron on the Dark Land.pdf
Leslie-Hurd2015-Verifying Linearizability of IntelR Software Guard Extensions.pdf
Leveraging Intel SGX to Create a Nondisclosure Cryptographic library.pdf
LightBox-SGX-assisted secure network functions.pdf
Lind2016 - Teechan - Payment Channels Using TEE.pdf
Lind2017 - Teechain-scalable blockchain payments using TEE.pdf
Link2016-Automatic Enforcement of Expressive Security Policies using Enclaves.pdf
Nguyen2017- EnGarde-Mutually-Trusted Inspection of SGX Enclaves.pdf
Ohrimenko2016- Oblivious Multi-Party Machine Learning on Trusted Processors.pdf
On Making Emerging TEE Accessible to Developers.pdf
Paladi2016-TruSDN_ Bootstrapping Trust in Cloud Network Infrastructure.pdf
Pires2016 - Secure Content-Based Routing Using SGX.pdf
Pires2017- A lightweight MapReduce framework for secure processing with SGX.pdf
Proof of Luck- an Efficient blockchain consensus protocol.pdf
rollback and forking detection for trusted execution environments using lightweight (2).pdf
Rollback and Forking Detection for Trusted Execution environments using lightweight.pdf
SAFETY - Secure gwAs in Federated Environment.pdf
Sasy-ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf
Schuster2015- VC3-Trustworthy Data Analytics in the Cloud using SGX.pdf
sec17-lee-jaehyuk.pdf
sec17-lee-sangho.pdf
sec17-van_bulck.pdf
Seitzer2015-A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.pdf
Seo2017 - SGX-Shield -Enabling Address Space Layout Randomization for SGX Programs.pdf
Shepherd2017a- Secure and Trusted Execution-Past .pdf
Shinde2015 - Preventing Page Faults from Telling Your Secrets.pdf
Sinha2015- Moat Verifying Confidentiality of Enclave Programs.pdf
Stewin2016 - Malware Guard Extension_ Using SGX to Conceal Cache Attacks.pdf
Strackx2016-Developing Secure SGX Enclaves New Challenges on the Horizon.pdf
Strackx2016a - Ariadne-A Minimal Approach to State Continuity.pdf
Swami2017 - Intel SGX Remote Attestation is not sufficient.pdf
Tamrakar2017-The Circle Game-Scalable Private Membership Test Using Trusted Hardware.pdf
Tramer2016 - Sealed-Glass Proofs.pdf
Tsai2017 -Graphene-SGX.pdf
Tychalas2017-SGXCrypter.pdf
Volp2016-Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control .pdf
Weichbrodt2016-AsyncShock - Exploiting Synchronisation Bugs in Intel SGX Enclaves.pdf
Weiser2017 - SGXIO- Generic Trusted IO Path for Intel SGX.pdf
Weisse2017 - Regaining Lost Cycles with HotCalls.pdf
XingBCShanahanM2016-Intel__ Software Guard Extensions (Intel__ SGX) Software Support for Dynamic Memory Allocation inside an Enclave.pdf
Xu2015-Controlled-Channel Attacks_ Deterministic Side Channels for Untrusted Operating Systems.pdf
ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf
Zhang2016 - Town Crier.pdf
Zhang2017-REM Resource-Efficient Mining for Blockchains.pdf