Proceedings of the 2nd Workshop on System Software for Trusted Execution 2017
DOI: 10.1145/3152701.3152710
|View full text |Cite
|
Sign up to set email alerts
|

Challenges For Scaling Applications Across Enclaves

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Although they are arguable for performance overhead and trusted computing base size, they are preferred for ease of development and comparable performance. Graphene SGX [159], Occlum [160], Fortanix [161], Anjuna [162], Scone [163] are some examples of lib-OSs that can be used to execute applications on Intel SGX. Another approach for the shared environment considerations could be dividing the data and operations between non-colluding servers, utilizing MPC techniques, into non-colluding servers running on different cloud environments.…”
Section: ) Shared Environmentmentioning
confidence: 99%
“…Although they are arguable for performance overhead and trusted computing base size, they are preferred for ease of development and comparable performance. Graphene SGX [159], Occlum [160], Fortanix [161], Anjuna [162], Scone [163] are some examples of lib-OSs that can be used to execute applications on Intel SGX. Another approach for the shared environment considerations could be dividing the data and operations between non-colluding servers, utilizing MPC techniques, into non-colluding servers running on different cloud environments.…”
Section: ) Shared Environmentmentioning
confidence: 99%
“…Researchers from Intel proposed the use of SGX for securing Barbican [16]. Along the same lines, Fortanix' selfdefending key management service (SDKMS) [44], [6] also uses SGX to securely generate, store and use cryptographic keys, certificates and various types of secrets. Both approaches essentially provide a replacement for the functionality normally provided by HSMs by using enclaves, hence reducing costs and providing better extensibility.…”
Section: Macro-benchmarksmentioning
confidence: 99%