• Mosier N, Nemati H, Mitchell J and Trippel C. (2024). Serberus: Protecting Cryptographic Code from Spectres at Compile-Time 2024 IEEE Symposium on Security and Privacy (SP). 10.1109/SP54263.2024.00048. 979-8-3503-3130-1. (4200-4219).

    https://ieeexplore.ieee.org/document/10646752/

  • Islam M, Zamani M, Hamlen K, Khan L and Kantarcioglu M. (2024). Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. Data and Applications Security and Privacy XXXVIII. 10.1007/978-3-031-65172-4_5. (71-91).

    https://link.springer.com/10.1007/978-3-031-65172-4_5

  • Will N and Maziero C. (2023). Intel Software Guard Extensions Applications: A Survey. ACM Computing Surveys. 55:14s. (1-38). Online publication date: 31-Dec-2024.

    https://doi.org/10.1145/3593021

  • Alam A and Chen K. (2023). TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis. Frontiers in Big Data. 10.3389/fdata.2023.1296469. 6.

    https://www.frontiersin.org/articles/10.3389/fdata.2023.1296469/full

  • Wang Y, Zhang Z, He N, Zhong Z, Guo S, Bao Q, Li D, Guo Y and Chen X. SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. (2710-2724).

    https://doi.org/10.1145/3576915.3623213

  • Xia K, Duch W, Sun Y, Xu K, Fang W, Luo H, Zhang Y, Sang D, Xu X, Wang F and Wu D. Privacy-Preserving Brain–Computer Interfaces: A Systematic Review. IEEE Transactions on Computational Social Systems. 10.1109/TCSS.2022.3184818. 10:5. (2312-2324).

    https://ieeexplore.ieee.org/document/9808103/

  • Arshad H, Picazo-Sanchez P, Johansen C and Schneider G. (2023). Attribute-based encryption with enforceable obligations. Journal of Cryptographic Engineering. 10.1007/s13389-023-00317-1. 13:3. (343-371). Online publication date: 1-Sep-2023.

    https://link.springer.com/10.1007/s13389-023-00317-1

  • Paju A, Javed M, Nurmi J, Savimäki J, McGillion B and Brumley B. SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. Proceedings of the 18th International Conference on Availability, Reliability and Security. (1-15).

    https://doi.org/10.1145/3600160.3600169

  • Chen S, Lin Z and Zhang Y. Controlled data races in enclaves. Proceedings of the 32nd USENIX Conference on Security Symposium. (4069-4086).

    /doi/10.5555/3620237.3620465

  • Duy K and Lee H. SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing. IEEE Transactions on Cloud Computing. 10.1109/TCC.2022.3207145. 11:3. (2473-2490).

    https://ieeexplore.ieee.org/document/9906059/

  • Brito C, Ferreira P, Portela B, Oliveira R and Paulo J. SOTERIA: Preserving Privacy in Distributed Machine Learning. Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. (135-142).

    https://doi.org/10.1145/3555776.3578591

  • Li X, Sun N, Luo Y and Gao M. (2023). SODA: A Set of Fast Oblivious Algorithms in Distributed Secure Data Analytics. Proceedings of the VLDB Endowment. 16:7. (1671-1684). Online publication date: 1-Mar-2023.

    https://doi.org/10.14778/3587136.3587142

  • Li X, Li F and Gao M. (2023). Flare: A Fast, Secure, and Memory-Efficient Distributed Analytics Framework. Proceedings of the VLDB Endowment. 16:6. (1439-1452). Online publication date: 1-Feb-2023.

    https://doi.org/10.14778/3583140.3583158

  • Brito C, Ferreira P, Portela B, Oliveira R and Paulo J. Privacy-Preserving Machine Learning on Apache Spark. IEEE Access. 10.1109/ACCESS.2023.3332222. 11. (127907-127930).

    https://ieeexplore.ieee.org/document/10314994/

  • Zhu T, Liao C, Guo L, Zhou Z, Ruan W, Wang W, Li X, Zhang Q, Zheng H, Wang S and Liu Y. (2022). Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework 2022 IEEE 7th International Conference on Smart Cloud (SmartCloud). 10.1109/SmartCloud55982.2022.00018. 978-1-6654-5179-6. (74-82).

    https://ieeexplore.ieee.org/document/9944795/

  • Jiang J, Qi J, Shen T, Chen X, Zhao S, Wang S, Chen L, Zhang G, Luo X and Cui H. Cronus: Fault-Isolated, Secure and High-Performance Heterogeneous Computing for Trusted Execution Environment. Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture. (124-143).

    https://doi.org/10.1109/MICRO56248.2022.00019

  • Chen Y, Tian X, Wang Q, Jiang J, Li M and Zhang Q. SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2020.3045449. 19:3. (2038-2053).

    https://ieeexplore.ieee.org/document/9296813/

  • Zhou L, Ding X and Zhang F. (2022). Smile: Secure Memory Introspection for Live Enclave 2022 IEEE Symposium on Security and Privacy (SP). 10.1109/SP46214.2022.9833714. 978-1-6654-1316-9. (386-401).

    https://ieeexplore.ieee.org/document/9833714/

  • Park S, Kim S and Lim Y. Fairness Audit of Machine Learning Models with Confidential Computing. Proceedings of the ACM Web Conference 2022. (3488-3499).

    https://doi.org/10.1145/3485447.3512244

  • Chen X, Zhao S, Qi J, Jiang J, Song H, Wang C, Li T, Chan T, Zhang F, Luo X, Wang S, Zhang G and Cui H. (2022). Efficient and DoS-resistant Consensus for Permissioned Blockchains. Performance Evaluation. 153:C. Online publication date: 1-Feb-2022.

    https://doi.org/10.1016/j.peva.2021.102244

  • De Capitani di Vimercati S, Facchinetti D, Foresti S, Oldani G, Paraboschi S, Rossi M and Samarati P. Multi-dimensional indexes for point and range queries on outsourced encrypted data. 2021 IEEE Global Communications Conference (GLOBECOM). (1-6).

    https://doi.org/10.1109/GLOBECOM46510.2021.9685186

  • Choudhary R, Yu J, Fletcher C and Morrison A. Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy. MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture. (607-622).

    https://doi.org/10.1145/3466752.3480068

  • Widanage C, Liu W, Li J, Chen H, Wang X, Tang H and Fox J. (2021). HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). 10.1109/CLOUD53861.2021.00098. 978-1-6654-0060-2. (733-743).

    https://ieeexplore.ieee.org/document/9582159/

  • Huang Y, Lv S, Liu Z, Song X, Li J, Yuan Y and Dong C. (2021). Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Science China Information Sciences. 10.1007/s11432-020-3039-x. 64:8. Online publication date: 1-Aug-2021.

    https://link.springer.com/10.1007/s11432-020-3039-x

  • Li M, Xia Y and Chen H. Confidential serverless made efficient with <u>p</u>lug-<u>in</u> <u>e</u>nclaves. Proceedings of the 48th Annual International Symposium on Computer Architecture. (306-318).

    https://doi.org/10.1109/ISCA52012.2021.00032

  • Zhang D, Gu Z and Duan Z. (2021). A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX. Wireless Communications and Mobile Computing. 10.1155/2021/6660709. 2021. (1-12). Online publication date: 17-Mar-2021.

    https://www.hindawi.com/journals/wcmc/2021/6660709/

  • Zhan J, Li Y, Liu Y, Li H, Zhang S, Lin L and Su C. (2021). NSGA-II-Based Granularity-Adaptive Control-Flow Attestation. Security and Communication Networks. 2021. Online publication date: 1-Jan-2021.

    https://doi.org/10.1155/2021/2914192

  • Qayyum A, Qadir J, Bilal M and Al-Fuqaha A. Secure and Robust Machine Learning for Healthcare: A Survey. IEEE Reviews in Biomedical Engineering. 10.1109/RBME.2020.3013489. 14. (156-180).

    https://ieeexplore.ieee.org/document/9153891/

  • Duy K, Noh T, Huh S and Lee H. Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective. IEEE Access. 10.1109/ACCESS.2021.3136889. 9. (168656-168677).

    https://ieeexplore.ieee.org/document/9656734/

  • Liu X, Deng R, Wu P and Yang Y. (2020). Lightning-fast and privacy-preserving outsourced computation in the cloud. Cybersecurity. 10.1186/s42400-020-00057-3. 3:1. Online publication date: 1-Dec-2020.

    https://cybersecurity.springeropen.com/articles/10.1186/s42400-020-00057-3

  • Kim K, Kim C, Rhee J, Yu X, Chen H, Tian D and Lee B. Vessels. Proceedings of the 11th ACM Symposium on Cloud Computing. (462-476).

    https://doi.org/10.1145/3419111.3421282

  • Asvadishirehjini A, Kantarcioglu M and Malin B. (2020). A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 10.1109/TPS-ISA50397.2020.00028. 978-1-7281-8543-9. (138-147).

    https://ieeexplore.ieee.org/document/9325351/

  • Islam M, Ozdayi M, Khan L and Kantarcioglu M. (2020). Secure IoT Data Analytics in Cloud via Intel SGX 2020 IEEE 13th International Conference on Cloud Computing (CLOUD). 10.1109/CLOUD49709.2020.00020. 978-1-7281-8780-8. (43-52).

    https://ieeexplore.ieee.org/document/9284223/

  • Tsai P, Sanchez A, Fletcher C and Sanchez D. Safecracker: Leaking Secrets through Compressed Caches. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. (1125-1140).

    https://doi.org/10.1145/3373376.3378453

  • Shaon F and Kantarcioglu M. (2020). SGX-IR: Secure Information Retrieval with Trusted Processors. Data and Applications Security and Privacy XXXIV. 10.1007/978-3-030-49669-2_21. (367-387).

    https://link.springer.com/10.1007/978-3-030-49669-2_21

  • Küçük K, Grawrock D and Martin A. (2019). Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. EURASIP Journal on Information Security. 10.1186/s13635-019-0091-5. 2019:1. Online publication date: 1-Dec-2019.

    https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-019-0091-5

  • Zhang Z, Wang K, Lin W, Fu A and Wong R. Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. Proceedings of the ACM Symposium on Cloud Computing. (287-298).

    https://doi.org/10.1145/3357223.3362732

  • Duan H, Wang C, Yuan X, Zhou Y, Wang Q and Ren K. LightBox. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. (2351-2367).

    https://doi.org/10.1145/3319535.3339814

  • Contiu S, Vaucher S, Pires R, Pasin M, Felber P and Reveillere L. (2019). Anonymous and Confidential File Sharing over Untrusted Clouds 2019 38th Symposium on Reliable Distributed Systems (SRDS). 10.1109/SRDS47363.2019.00013. 978-1-7281-4222-7. (21-2110).

    https://ieeexplore.ieee.org/document/9049577/

  • Rodrigo A, Dayarathna M and Jayasena S. (2019). Latency-Aware Secure Elastic Stream Processing with Homomorphic Encryption. Data Science and Engineering. 10.1007/s41019-019-00100-5. 4:3. (223-239). Online publication date: 1-Sep-2019.

    http://link.springer.com/10.1007/s41019-019-00100-5

  • Skarlatos D, Yan M, Gopireddy B, Sprabery R, Torrellas J and Fletcher C. MicroScope. Proceedings of the 46th International Symposium on Computer Architecture. (318-331).

    https://doi.org/10.1145/3307650.3322228

  • Kantarcioglu M. Securing Big Data. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. (1-2).

    https://doi.org/10.1145/3322431.3326330

  • Rodrigo A, Dayarathna M and Jayasena S. Privacy Preserving Elastic Stream Processing with Clouds Using Homomorphic Encryption. Database Systems for Advanced Applications. (264-280).

    https://doi.org/10.1007/978-3-030-18579-4_16

  • Thoma C, Lee A and Labrinidis A. Behind Enemy Lines. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. (243-254).

    https://doi.org/10.1145/3292006.3300021

  • Kantarcioglu M and Ferrari E. (2019). Research Challenges at the Intersection of Big Data, Security and Privacy. Frontiers in Big Data. 10.3389/fdata.2019.00001. 2.

    https://www.frontiersin.org/article/10.3389/fdata.2019.00001/full

  • Bauman E, Wang H, Zhang M and Lin Z. SGXElide: enabling enclave code secrecy via self-modification. Proceedings of the 2018 International Symposium on Code Generation and Optimization. (75-86).

    https://doi.org/10.1145/3168833