A curated list of system papers using/about Intel SGX. I'll try to keep this list updated. I gladly accept PRs.
Are you a female researcher working in the area of TEEs? We are looking for experts to help with a Workshop TPC. Please get in touch!
| Title | Venue | |
|---|---|---|
| Using Innovative Instructions to Create Trustworthy Software Solutions | HASP@ISCA'13 | link |
| Cooperation and Security Isolation of Library OSes for Multi-Process Applications | EuroSys'14 | link |
| Shielding Applications from an Untrusted Cloud with Haven | TOCS'15 | link |
| VC3: trustworthy data analytics in the cloud using SGX | S&P'15 | link |
| Moat: Verifying Confidentiality of Enclave Programs | CCS'15 | link |
| Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications | ATC'16 | link |
| Exploring the use of Intel SGX for Secure Many-Party Applications | SysTEX'16 | link |
| SCONE: Secure Linux Containers with Intel SGX | OSDI'16 | link |
| Ryoan: a distributed sandbox for untrusted computation on secret data. | OSDI'16 | link |
| SGX Support for Dynamic Memory Management Inside an Enclave | HASP'16 | link |
| Secure Content-Based Routing Using Intel Software Guard Extensions | Middleware'16 | link |
| SecureKeeper: Confidential ZooKeeper using Intel SGX | Middleware'16 | link |
| AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves | ESORICS'16 | link |
| Eleos: ExitLess OS Services for SGX Enclaves | EuroSys'17 | link |
| SGXBounds: Memory Safety for Shielded Execution | EuroSys'17 | link |
| Hybrids on Steroids: SGX-Based High Performance BFT | EuroSys'17 | link |
| PANOPLY: Low-TCB Linux Applications with SGX Enclaves | NDSS'17 | link |
| Teechan: Payment Channels Using Trusted Execution Environments | BITCOIN'17 | link |
| SGXIO: Generic Trusted I/O Path for Intel SGX | CODASPY'17 | link |
| TrustJS: Trusted Client-side Execution of JavaScript | EuroSec'17 | link |
| SGX-Log: Securing System Logs With SGX | Asia CCS'17 | link |
| Secure Live Migration of SGX Enclaves on Untrusted Cloud | DSN'17 | link |
| Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory | DSN'17 | link |
| SecureStreams: Reactive Middleware for Secure Data Stream | DEBS'17 | link |
| Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves | ISCA'17 | link |
| Glamdring: Automatic Application Partitioning for Intel SGX | ATC'17 | link |
| Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | Usenix Security'17 | link |
| S-NFV: Securing NFV states by using SGX | CODASPY'17 | link |
| Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments | NSDI'17 | link |
| Securing Data Analytics on SGX With Randomization | ESORICS'17 | link |
| Software Grand Exposure: SGX Cache Attacks Are Practical | WooT'17 | link |
| Komodo: Using verification to disentangle secure-enclave hardware from software | SOSP'17 | link |
| POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave | CCS'17 | link |
| Iron: Functional Encryption using Intel SGX | CCS'17 | link |
| A Formal Foundation for Secure Remote Execution of Enclaves | CCS'17 | link |
| SGX-Bomb: Locking Down the Processor via Rowhammer Attack | SysTEX'17 | link |
| X-Search: Revisiting Private Web Search using Intel SGX | Middleware'17 | link |
| Cache Attacks on Intel SGX | EuroSec'17 | link |
| SGXKernel: A Library Operating System Optimized for Intel SGX | CF'17 | link |
| Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX | ATC'17 | link |
| HardIDX: Practical and Secure Index with SGX | DBSec'17 | link |
| VAULT: Reducing Paging Overheads in SGX with Efficient Integrity Verification Structures | ASPLOS'18 | link |
| STANlite - a database engine for secure data processing at rack-scale level | IC2E'18 | link |
| EnclaveDB: A Secure Database using SGX | SP'18 | link |
| Oblix: An Efficient Oblivious Search Index | S&P'18 | link |
| ZeroTrace: Oblivious Memory Primitives from Intel SGX | NDSS'18 | link |
| OBLIVIATE: A Data Oblivious Filesystem for Intel SGX | NDSS'18 | link |
| EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution | DSN'18 | link |
| Troxy: Transparent Access to Byzantine Fault-Tolerant Systems | DSN'18 | link |
| LibSEAL: Revealing Service Integrity Violations Using Trusted Execution | EuroSys'18 | link |
| PESOS: Policy Enhanced Secure Object Store | EuroSys'18 | link |
| Bring the Missing Jigsaw Back: TrustedClock for SGX Enclaves | EuroSec'18 | link |
| Migrating SGX Enclaves with Persistent State | DSN'18 | link |
| SafeBricks: Shielding Network Functions in the Cloud | NSDI'18 | link |
| ShieldBox: Secure Middleboxes using Shielded Execution | SOSR'18 | link |
| CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions | ICDCS'18 | link |
| SGX-Aware Container Orchestration for Heterogeneous Clusters | ICDCS'18 | link |
| Varys: Protecting SGX enclaves from practical side-channel attacks | ATC'18 | link |
| Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization | SysTEX'18 | link |
| Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms | SRDS'18 | link |
| PubSub-SGX: exploiting Trusted Execution Environments for privacy-preserving publish/subscribe systems | SRDS'18 | link |
| sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves | Middleware'18 | link |
| EActors: Fast and flexible trusted computing using SGX | Middleware'18 | link |
| DelegaTEE: Brokered Delegation Using Trusted Execution Environments | USENIX Security'18 | link |
| Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution | USENIX Security'18 | link |
| Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX) | ISCC'18 | link |
| Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card | HASP@ISCA'19 | link |
| A Practical Intel SGX Setting for Linux Containers in the Cloud | CODASPY'19 | link |
| Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing | CODASPY'19 | link |
| Everything you should know about Intel SGX performance on virtualized systems | SIGMETRICS'19 | link |
| ShieldStore: Shielded In-memory Key-value Storage with SGX | EuroSys'19 | link |
| Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware | ICLR'19 | link |
| OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX | NDSS‘19 | link |
| Trust more, serverless | SysTor'19 | link |
| Clemmys: Towards Secure Remote Execution in FaaS | SysTor'19 | link |
| Using Trusted Execution Environments for Secure Stream Processing of Medical Data | DAIS'19 | link |
| A Hybrid Approach to Secure Function Evaluation using SGX | AsiaCCS'19 | link |
| Secured Routines: Language-based Construction of Trusted Execution Environments | ATC'19 | link |
| NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX | DSN'19 | link |
| Forward and Backward Private Searchable Encryption with SGX | EuroSec'19 | link |
| TEE-Perf: A Profiler for Trusted Execution Environments | DSN'19 | link |
| SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution | EuroS&P'19 | link |
| Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves: Minimised TCB on secret-code execution with Early Private Mode (EPM) | EURASIP Journal on Information Security | link |
| BITE: Bitcoin Lightweight Client Privacy using Trusted Execution | SEC'19 | link |
| Towards Memory Safe Enclave Programming with Rust-SGX | CCS'19 | link |
| A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes | CCS'19 | link |
| OPERA: Open Remote Attestation for Intel’s Secure Enclaves | CCS'19 | link |
| LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed | CCS'19 | link |
| BLOXY: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains | SRDS'19 | link |
| AccTEE: A WebAssembly-based Two-way Sandbox for Trusted Resource Accounting | Middleware'19 | link |
| EnclaveCache: A Secure and Scalable Key-value Cache in Multi-tenant Clouds using Intel SGX | Middleware'19 | link |
| PrivaTube: Privacy-Preserving Edge-Assisted Video Streaming | Middleware'19 | link |
| Teechain: a secure payment network with asynchronous blockchain access | SOSP'19 | link |
| Plundervolt: Software-based Fault Injection Attacks against Intel SGX | Oakland '20 | link |
| ObliDB: Oblivious Query Processing using Secure Enclaves | VLDB'19 | link |
| CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves | USENIX ATC'19 | link |
| Computation on Encrypted Data using Dataflow Authentication | PETS'20 | link |
| Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution | NDSS'20 | link |
| COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX | ASPLOS'20 | link |
| Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX | ASPLOS'20 | link |
| MPTEE: Bringing Flexible and Efficient Memory Protection to Intel SGX | EuroSys'20 | link |
| Autarky: Closing controlled channels with self-paging enclaves | EuroSys'20 | link |
| Trust management as a service: Enabling trusted execution in the face of Byzantine stakeholders | DSN'20 | link |
| SeGShare: Secure Group File Sharing in the Cloud using Enclaves | DSN'20 | link |
| Civet: An Efficient Java Partitioning Framework for Hardware Enclaves | SEC'20 | link |
| BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof | SEC'20 | link |
| TEEMon: A continuous performance monitoring framework for TEEs | Middleware'20 | TBA |
| secureTF: A Secure TensorFlow Framework | Middleware'20 | link |
| Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors | SoCC'20 | link |
| PROXIMITEE: Hardened SGX Attestation and Trusted Path through Proximity Verification | CODASPY'20 | link |
| Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX | DSD'20 | link |
| Formal Foundations for Intel SGX Data Center Attestation Primitives | ICFEM'20 | link |
| EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX | RAID'20 | link |
| TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA | CCS'20 | link |
| Spons & Shields: Practical Isolation for Trusted Execution | VEE'21 | link |
| Aria: Tolerating Skewed Workloads in Secure In-memory Key-value Stores | ICDE'21 | link |
| TWINE: An Embedded Trusted Runtime for WebAssembly | ICDE'21 | link |
| CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs | NDSS'21 | link |
| VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface | USENIX Security'21 | link |
| SGXoMeter: Open and Modular Benchmarking for Intel SGX | EuroSec'21 | link |
| Building enclave-native storage engines for practical encrypted databases | VLDB'21 | link |
| MigSGX: A Migration Mechanism for Containers Including SGX Applications | UCC'21 | link |
Do you use or are you familiar with Intel SGX? If yes, we’d appreciate you could fill in this anonymous survey, it takes less than 60 seconds https://forms.gle/HdHqXiBdRp98CU6y7
Unpublished, tech-reports, or open-access:
| Title | |
|---|---|
| Intel SGX Explained | link |
| A Blockchain Based on Gossip? – a Position Paper | link |
| Proof of Luck: an Efficient Blockchain Consensus Protocol | link |
| Malware Guard Extension: Using SGX to Conceal Cache Attacks | link |
| Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric | link |
| DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization | link |
| Practical Enclave Malware with Intel SGX | link |
| Secure Network Interface with SGX | link |
| TaLoS: Secure and Transparent TLS Termination inside SGX Enclaves | link |
| Practical Enclave Malware with Intel SGX | link |
| EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves | link |
| HardIDX: Practical and Secure Index with SGX | link |
| SGAxe: How SGX Fails in Practice | link |
| Secure Processors | Part 1, Part 2 |