2018
DOI: 10.1109/tnet.2018.2868054
|View full text |Cite
|
Sign up to set email alerts
|

SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…Nodes broadcast or forward the proposed block on the P2P network in the consensus phase. Currently, we have seen the application of SGX for network communications, especially the SGX-based anonymity network [18], [19]. However, we have not seen any related attempts involving SGX for network optimization in the blockchain network, and we would like to point out that it is still a viable direction.…”
Section: Background On Blockchainmentioning
confidence: 99%
See 1 more Smart Citation
“…Nodes broadcast or forward the proposed block on the P2P network in the consensus phase. Currently, we have seen the application of SGX for network communications, especially the SGX-based anonymity network [18], [19]. However, we have not seen any related attempts involving SGX for network optimization in the blockchain network, and we would like to point out that it is still a viable direction.…”
Section: Background On Blockchainmentioning
confidence: 99%
“…Therefore, SGX suffers from side-channel attacks, in which the attacker observes the shared resources to obtain the control flow and the data access mode of the enclave program to infer the sensitive information in the enclave. Some side-channel attacks on SGX have exploded recently [19]. Although most of the sidechannel attacks are relatively difficult to be exploited, sufficient profit may drive attackers to attack the SGXbased platforms.…”
Section: B Advantages and Disadvantages Of Sgxmentioning
confidence: 99%
“…Most OFLs make some effort to narrow the syscall interface by only implementing certain syscalls. Minibox [27], SGX-Tor [21] and InkTag [12] handle part of system services with special care. InkTag has an application-level library to translate read/write syscalls into operations on memory mapped files.…”
Section: A Documentation-based Analysismentioning
confidence: 99%
“…There can also be availability failures as the platform owner can (maliciously) terminate an enclave. SGX can also be susceptible to side-channel attacks [34] and single point attacks. In section V-D we discuss why these drawbacks are not a problem in FLOCK.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%