Cited By
View all- Lau SBourgeat TPit-Claudel CChlipala ALuo BLiao XXu JKirda ELie D(2024)Specification and Verification of Strong Timing Isolation of Hardware EnclavesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690203(1121-1135)Online publication date: 2-Dec-2024
- Volos SFournet CHofmann JKöpf BOleksenko OLuo BLiao XXu JKirda ELie D(2024)Principled Microarchitectural Isolation on Cloud CPUsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690183(183-197)Online publication date: 2-Dec-2024
- Li MYang YChen GYan MZhang YQuek TGao DZhou JCardenas A(2024)SoK: Understanding Design Choices and Pitfalls of Trusted Execution EnvironmentsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644993(1600-1616)Online publication date: 1-Jul-2024
- Show More Cited By