acmccs / format
ACM consolidated LaTeX styles
☆67Updated 6 years ago
Alternatives and similar repositories for format
Users that are interested in format are comparing it to the libraries listed below
Sorting:
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆51Updated last month
- SGX Tutorial at CCS17: SGX Security and Privacy☆85Updated 7 years ago
- ☆30Updated 3 weeks ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- ☆17Updated 2 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- High-level performance analyser toolkit for Intel SGX☆39Updated 5 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Low-TCB Linux Applications with SGX Enclaves☆37Updated 5 years ago
- ☆19Updated last year
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆66Updated 5 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- Minimal RISC Extensions for Isolated Execution☆52Updated 5 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- Deep Learning with Intel SGX☆22Updated 6 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆47Updated 7 years ago
- mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)☆90Updated 5 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- ☆19Updated 4 years ago
- Protecting user secrets from compromised browsers and operating systems☆17Updated 6 years ago
- PoC exploits against various SGX enclaves☆14Updated 2 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- Teaching materials related to the Tamarin Prover☆70Updated 9 months ago
- Seminar 2016☆25Updated 8 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 4 months ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Example on how to use the Intel SGX implementation of AES-GCM☆28Updated 6 years ago
- ☆34Updated 2 years ago