Proceedings of the Twelfth European Conference on Computer Systems 2017
DOI: 10.1145/3064176.3064213
|View full text |Cite
|
Sign up to set email alerts
|

Hybrids on Steroids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…Data sealing can help an enclave to swap data with another enclave or to ease memory pressure. Few schemes describe the function because it is S id e -c h a n n e l a tt a c k s S in g le -p o in t a tt a c k s AHL [69] PoUW [47] PoET [48] PoLK [49] Hybster [53] SPoS [56] Hawk [57] ShadowEth [58] Ekiden [59] FastKitten [62] TC [63] Teechain [65] Tesseract [66] BITE [67] Obscuro [68] Airtnt [70] PrivacyGuard [71] TID [72] means that the scheme uses the function or suffers from the disadvantage. means that the scheme does not use the function or suffer from the disadvantage.…”
Section: A Summary and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Data sealing can help an enclave to swap data with another enclave or to ease memory pressure. Few schemes describe the function because it is S id e -c h a n n e l a tt a c k s S in g le -p o in t a tt a c k s AHL [69] PoUW [47] PoET [48] PoLK [49] Hybster [53] SPoS [56] Hawk [57] ShadowEth [58] Ekiden [59] FastKitten [62] TC [63] Teechain [65] Tesseract [66] BITE [67] Obscuro [68] Airtnt [70] PrivacyGuard [71] TID [72] means that the scheme uses the function or suffers from the disadvantage. means that the scheme does not use the function or suffer from the disadvantage.…”
Section: A Summary and Discussionmentioning
confidence: 99%
“…Thus, Behl et al [53] propose Hybster, an improved BFT algorithm based on SGX, which enhances the performance by parallelizing the protocols. To prevent replay attacks where an attack saves the old state information to reset the subsystem, Hybster implements a trusted counter based on SGX for each node, which is called TrInX.…”
Section: B Efficiency Issues Of Consensus Algorithmmentioning
confidence: 99%
“…7. Obtained data resort to comparison and consensus [15], [16] on the enclave's hash, after each participant node had compiled its own copy of the source code. This approach would require that the attacker compromises a certain number of build servers, which is hard to accomplish.…”
Section: Tamperingmentioning
confidence: 99%
“…The Heard-Of (HO) model [Biely et al 2007;Charron-Bost and Schiper 2009] requires protocols to be divided into rounds, allowing processes to execute in lock-step. It was implemented in Isabelle/HOL [Charron-Bost et al 2011] and used to verify the EIGByz [Bar-Noy et al 1992] Byzantine agreement algorithm for synchronous systems. Model checking and the HO-model have also been used in [Chaouch-Saad et al 2009;Schiper 2007, 2008] to verify crash fault-tolerant consensus algorithms [Charron-Bost and Schiper 2009].…”
Section: Logics and Modelsmentioning
confidence: 99%