This TiddlyWiki contains the following tiddlers:
- /Users/hongbochen/Code/ya0guang.github.io/tiddly/tiddlers/$__StoryList_1.tid
- /Users/hongbochen/Code/ya0guang.github.io/tiddly/tiddlers/$__StoryList_2.tid
- /Users/hongbochen/Code/ya0guang.github.io/tiddly/tiddlers/$__StoryList.tid
- `tvm.build`
- `wasm_runtime_memory_init`
- $:/config/AutoSave
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/advanced-search
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/encryption
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/import
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/language
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/more-page-actions
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/new-journal
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/palette
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/storyview
- $:/config/PageControlButtons/Visibility/$:/core/ui/Buttons/tag-manager
- $:/config/RelinkOnRename
- $:/config/WikiParserRules/Inline/wikilink
- $:/core
- $:/DefaultTiddlers
- $:/Import
- $:/isEncrypted
- $:/language
- $:/languages/en-US
- $:/languages/zh-CN
- $:/palette
- $:/plugins/tiddlywiki/highlight
- $:/plugins/tiddlywiki/katex
- $:/plugins/tiddlywiki/markdown
- $:/SiteSubtitle
- $:/SiteTitle
- $:/status/RequireReloadDueToPluginChange
- $:/StoryList
- $:/theme
- $:/themes/tiddlywiki/snowwhite
- $:/themes/tiddlywiki/vanilla
- $:/themes/tiddlywiki/vanilla/metrics/sidebarbreakpoint
- $:/themes/tiddlywiki/vanilla/metrics/sidebarwidth
- $:/themes/tiddlywiki/vanilla/metrics/storyleft
- $:/themes/tiddlywiki/vanilla/metrics/storyright
- $:/themes/tiddlywiki/vanilla/metrics/storywidth
- $:/themes/tiddlywiki/vanilla/metrics/tiddlerwidth
- $:/themes/tiddlywiki/vanilla/options/codewrapping
- $:/themes/tiddlywiki/vanilla/options/sidebarlayout
- $:/themes/tiddlywiki/vanilla/options/stickytitles
- $:/themes/tiddlywiki/vanilla/settings/backgroundimageattachment
- $:/view
- A Design and Verification Methodology for Secure Isolated Regions
- A Formal Foundation for Secure Remote Execution of Enclaves
- A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification
- A Study of Modern Linux API Usage and Compatibility: What to Support When You’re Supporting
- A Survey on Mix Networks and Their Secure Applications
- A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes
- Access Control: Policies, Models, and Mechanisms
- AccTEE: A WebAssembly-based Two-way Sandbox for Trusted Resource Accounting
- Achieving Keyless CDNs with Conclaves
- add existing ssh key
- AddressSanitizer: A fast address sanity checker
- AddressSanitizer.png
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
- Agamotto1.png
- Agamotto2.png
- AI + CC Checklist
- AMD Secure Processor for Confidential Computing Security Review
- An efficient and secure scheme of verifiable computation for Intel SGX
- Apache Flink™: Stream and Batch Processing in a Single Engine
- API Misuse
- API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph
- ARMWorlds.png
- Asm Cheat Sheets
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment
- Attack in Compositional AI Systems
- Basal Ganglia
- BesFS_overview.png
- BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
- bg4.png
- BlackMirror: Preventing Wallhacks in 3D Online FPS Games
- bloodSupply1.png
- bloodSupply2.jpg
- Brainstem & Cerebellum
- BranchShadowing2.png
- BranchShadowing3.png
- Build Linux Kernel
- Building GPU TEEs using CPU Secure Enclaves with GEVisor
- CC Guest GPU VM Setup
- Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing
- CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation
- CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs
- chancel2.png
- chancel3.png
- chancelt3.png
- Clemmys: Towards Secure Remote Execution in FaaS
- COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX
- collapse
- ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code
- Constant-Time Foundations for the New Spectre Era
- Controlled-Channel Attacks: Deterministic SideChannels for Untrusted Operating Systems
- Covering, Blood Supply and Ventricular System
- covering1.png
- Cranial Nerves
- crbl1.png
- crbl2.jpg
- Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
- Decentralized Information Flow Control
- Deep Just-In-Time Inconsistency Detection Between Comments and Source Code
- delegatee_centrally.png
- delegatee_p2p.png
- DelegaTEE: Brokered Delegation Using Trusted Execution Environments
- Detecting Misuses of Security APIs: A Systematic Review
- Detection: Logic bugs, inconsistency, typo, etc.
- Dev1.jpg
- Dev2.png
- Dev3.jpg
- Development
- DIFFUZZ: Differential Fuzzing for Side-Channel Analysis
- Docker Common Commands
- Dune: Safe User-level Access to Privileged CPU Features
- Dynamic Binary Translation for SGX Enclaves (Ratel)
- Emilia: Catching Iago in Legacy Code
- Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification
- ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
- Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
- Evaluating Fuzz Testing
- Examining Zero-Shot Vulnerability Repair with Large Language Models
- Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization
- Exploring and enforcing security guarantees via program dependence graphs
- Expressing Information Flow Properties
- FaaS Papers, mainly in TEE
- FaCT_Arch.png
- FaCT: A Flexible, Constant-Time Programming Language
- Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code
- Frustrated with Code Quality Issues? LLMs can Help!
- GEVisor.png
- GEVisor2.png
- Git Notes
- gpt_decoder.png
- gpt_inference.png
- GPU TEE: Potential Problems
- graphene_arch.png
- Graphene-SGX PF
- Graphene-SGX PF Callbacks
- Graphene-SGX PF Data Structure
- Graphene-SGX PF Implementation
- Graphene-SGX PF Internal
- Graphene-SGX PF User Interfaces
- GrapheneSGX
- Gyri & Sulci
- gyri&sulci1.png
- gyri&sulci2.png
- gyri&sulci3.png
- gyri&sulci4.png
- Honeycomb: Secure and Efficient GPU Executions via Static Validation
- honeycomb.png
- image.png
- Industry Connecting
- InferFix: End-to-End Program Repair with LLMs over Retrieval-Augmented Prompts
- Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
- Information Flow Tracking for Heterogeneous Compartmentalized Software
- Interface Security
- Intro
- intro1.png
- intro2.png
- intro3.png
- intro4.png
- intro5.jpg
- Large Language Models for Code: Security Hardening and Adversarial Testing
- Leaky DNN: Stealing Deep-learning Model Secret with GPU Context-switching Side-channel
- LeakyDNN_AttackFlow.png
- LeakyDNN_Model.png
- Lessons from Building Static Analysis Tools at Google
- Limbic System
- limbic1.png
- limbic2.png
- limbic3.jpg
- limbic4.png
- limbic5.jpg
- LLM (for) Security
- llvm_output.png
- LLVMModuleNode::Init
- LM Side-channel
- m1.jpg
- m2.jpg
- m3.jpg
- Machine Learning with Confidential Computing: A Systematization of Knowledge
- Matel Music
- mb1.png
- mb2.png
- memory_protect_summary_sgx.png
- MetaTiddler
- mixnet1.png
- mixnet2.png
- mixnet3.png
- mixnet4.png
- Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud
- Next-Gen TEE
- NVIDIA H100: Trust Establishment
- ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof
- Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX
- Opaque: An Oblivious and Encrypted Distributed Analytics Platform
- p1.png
- p2.png
- PapersByFields
- PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
- PCC: Conventional and Foundational
- PL Books
- Potential Threats of Memory Integrity on SEV(SNP), (Scalable) SGX2, and TDX
- PRIDWEN_Overview.png
- PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis
- Privado: Practical and Secure DNN Inference with Enclaves
- PrivGuard: Privacy Regulation Compliance Made Easier
- PrivGuard.png
- Prompt Engineering
- Proof Checking/Verification for SMT Solvers
- Proof Complexity vs. Code Complexity
- Proof-carring Code
- Provably-Safe Multilingual Software Sandboxing using WebAssembly
- Rabbit Hole of LLM
- RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection
- S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX
- Safe, Untrusted Agents Using Proof-Carrying Code
- SafeStack & CPI
- SAT & SMT
- Scalable Memory Protection in the Penglai Enclave
- Scaling Static Analyses at Facebook
- Screen Shot 2022-01-24 at 11.26.06 PM.png
- Screen Shot 2022-10-09 at 18.28.47.png
- Screen Shot 2022-10-10 at 15.20.07.png
- Screenshot 2023-10-22 at 11.23.07.png
- Screenshot 2023-10-24 at 15.58.16.png
- Screenshot 2023-10-29 at 12.45.58.png
- Screenshot 2024-02-02 at 15.34.39.png
- SDK_PF_Close
- SDK_PF_DataNode
- SDK_PF_Flush
- SDK_PF_metadata
- SDK_PF_New
- SDK_PF_Write
- SDK_PFImplementations
- SDK_PFUserInterfaces
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- secgpt.png
- Secure Computing
- Securing TEEs with Verifiable Execution Contracts
- SecurityPapersByTopic
- See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer
- SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients
- SENG1.png
- SENG2&3.png
- SEV Materials
- SevIOAttack1.png
- SevIOAttack2.png
- sgp_1.png
- sgp_2png
- sgp_3.png
- sgp_4png
- SGX Application Papers
- SGX Documents
- SGX Middleware (Papers)
- SGX Posts
- SGX_PF_Class
- sgx2_aliasing.png
- SGXCacheAttack.png
- SGXFuzz_Struct_Synthesis.png
- SGXFUZZ: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing
- SGXFuzz.png
- Shell Configs
- Side-Channel Meta
- SinClave: Hardware-assisted Singletons for TEEs
- sinclave1.png
- sinclave2.png
- Software Debloating
- Software Grand Exposure: SGX Cache Attacks Are Practical
- SoK: SGX.Fail: How Stuff Gets eXposed
- Symbolic Execution for Software Testing: Three Decades Later
- Syscall Fuzzers
- SystemPapers
- TDX Materials
- Teaclave
- Teaclave Commands
- TEEPapers
- TEEs on ARM
- The Hitchhiker’s Guide to Program Analysis: A Journey with Large Language Models
- The Most Common Habits from more than 200 English Papers written by Graduate Chinese Engineering Students
- To Read List
- Toward general diagnosis of static errors
- Towards Demystifying Serverless Machine Learning Training
- Towards Formal Proof Metrics
- Towards Formal Verification of State Continuity for Enclave Programs
- Trust more, serverless
- Trusted Computing Base TCB
- TrustZonePapers
- TVM Code Generation
- Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3
- VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning
- Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks
- ventricular.jpg
- Virtualization in SGX
- VRust: Automated Vulnerability Detection for Solana Smart Contracts
- WAMR `init_runtime`
- WAMR `load_from_sections`
- WAMR `wasm_application_execute_main`
- WAMR `wasm_interp_call_func_bytecode`
- WAMR `wasm_runtime_instantiate_internal`
- WAMR `wasm_runtime_load`
- WAMR Analysis
- WAMR Installation & run in SGX enclave
- WAMR+Teaclave
- wasm_runtime_env_init
- wasmtime
- Web Assembly+ SGX
- WebAssembly
- When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan
- Why3: Shepherd Your Herd of Provers
- Yu-Gi-Oh Meta 游戲王
- Доверя́й, но проверя́й: SFI safety for native-compiled Wasm