acmccs / format
ACM consolidated LaTeX styles
☆66Updated 5 years ago
Alternatives and similar repositories for format:
Users that are interested in format are comparing it to the libraries listed below
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆52Updated 2 weeks ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- SGX Tutorial at CCS17: SGX Security and Privacy☆85Updated 7 years ago
- High-level performance analyser toolkit for Intel SGX☆39Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆136Updated last month
- Deep Learning with Intel SGX☆22Updated 6 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- ☆19Updated 4 years ago
- ☆14Updated 3 years ago
- ☆30Updated 3 months ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- SGX protected filesystem demo☆12Updated 7 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Updated 5 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆25Updated 2 years ago
- ☆17Updated 2 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆21Updated 5 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 7 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆47Updated 6 years ago
- Low-TCB Linux Applications with SGX Enclaves☆36Updated 5 years ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆30Updated 6 years ago
- ☆13Updated 7 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆164Updated 2 years ago
- Sample codes to work with the C++ Paillier Library (http://hms.isi.jhu.edu/acsc/libpaillier/).☆8Updated 4 years ago
- ☆31Updated 6 months ago
- Implementation of the Reusable Enclaves paper☆13Updated last year
- ☆22Updated 3 years ago
- ☆27Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 2 months ago