[1] |
新浪科技. 匿名信用卡并不真匿名消费数据可定位持卡人身[EB/OL]. (2015-02-02)[2022-02-20]. https://tech.sina.com.cn/it/2015-02-02/doc-icczmvun5700243.shtml.
|
[2] |
36氪. 大数据时代下,“匿名化”真的能保护我们的隐私安全吗?[EB/OL]. (2019-05-31)[2022-02-20]. https://baijiahao.baidu.com/s?id=1635028831256131491&wfr=spider&for=pc.
|
[3] |
SODA project. D1.1 state of the art analysis of MPC techniques and frameworks[Z], 2017.
|
[4] |
FANG W, CHEN C, TAN J, et al. A hybrid-domain framework for secure gradient tree boosting[J]. arXiv:2005.08479, 2020.
|
[5] |
PATRA A, SCHNEIDER T, SURESH A, et al. ABY2.0: improved mixed-protocol secure two-party computation (full version)[C]. USENIX Security Symposium 2021.
|
[6] |
WENG H, ZHANG J, XUE F, et al. Privacy leakage of real-world vertical federated learning[J]. arXiv:2011.09290, 2020.
|
[7] |
ZHAO B, MOPURI K, BILEN H. Idlg: improved deep leakage from gradients[J]. arXiv:2001.02610, 2020
|
[8] |
WAINAKH A, VENTOLA F, Müβig T, Jens Keim, et al. User label leakage from gradients in federated learning[J]. arXiv:2105.09369, 2021.
|
[9] |
YIN H, MALLYA A, VAHDAT A, et al. See through gradients: Image batch recovery via gradinversion[C]. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021.
|
[10] |
CHEON J H, KIM A, KIM M, et al. Homomorphic encryption for arithmetic of approximate numbers[C]// International Conference on the Theory and Application of Cryptology and Information Security. Springer, Cham, 2017.
|
[11] |
CHEON J H, HAN K, KIM A, et al. A full RNS variant of approximate homomorphic encryption[C]. Selected areas in cryptography :. annual international workshop, SAC, 2018.
|
[12] |
CANELLA C, GENKIN D, GINER L, et al. “Fallout,” in proc ACM SIGSAC conf[Z]. Comput Commun Secur, 2019.
|
[13] |
VAN S S, MILBURN A, STERLUND S, et al. RIDL: rogue in-flight data load[C]. 2019 IEEE Symposium on Security and Privacy, 2019.
|
[14] |
SCHWARZ M, LIPP M, MOGHIMI D, et al. ZombieLoad[C]//2019 ACM SIGSAC Conf Comput Commun Secur., USA: ACM, 2019.
|
[15] |
CHEN G, CHEN S, XIAO Y, et al. Sgxpectre: stealing intel secrets from SGX enclaves via speculative execution[C]. In IEEE European Symposium on Security and Privacy, EuroS&P, 2019.
|
[16] |
VAN BULCK J, MINKIN M, WEISSE O, et al. Foreshadow: extracting the keys to the intel {SGX} kingdom with transient outof-order execution[C]. In 27th {USENIX} Security Symposium, {USENIX} Security, 2018.
|
[17] |
NILSSON A, BIDE H P, BRORSSON J. A survey of published attacks on intel SGX[Z], 2020.
|
[18] |
YAROM Y, FALKNER K. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack[C]. iProc 23rd USENIX Secur Symp, 2014.
|
[19] |
OSVIK D, SHAMIR A, TROMER E. Cache attacks and countermeasures: the case of AES[Z], 2006.
|
[20] |
TROMER E, OSVIK D, SHAMIR A. Efficient cache attacks on AES, and countermeasures[Z], 2010.
|
[21] |
GRUSS D, SPREITZER R, Mangard S. Cache template attacks: automating attacks on inclusive lastlevel caches[C]. Proc. 24th USENIX Secur Symp, 2015.
|
[22] |
LEE S, SHIH M, GERA P, et al. Inferring fine-grained control flow inside SGX enclaves with branch shadowing[Z], 2017.
|
[23] |
EVTYUSHKIN D, RILEY R, Abu-Ghazaleh N, et al. BranchScope: a new side-channel attack on directional branch predictor[C]. ACM SIGPLAN Not, 2018.
|
[24] |
HUO T, MENG X, WANG W, et al. Bluethunder: A 2-level directional predictor based side-channel attack against SGX[C]// IACR Trans. Cryptogr Hardw Embed Syst, 2020.
|
[25] |
KOCHER P, HORN J, FOGH A, et al. Spectre attacks: exploiting speculative execution[C]// In 2019 IEEE Symp Secur.Priv, 2019.
|
[26] |
KORUYEH E, KHASAWNEH K, SONG C, et al. Spectre returns! speculation attacks using the return stack buffer[Z], 2018.
|
[27] |
O’KEEFFE D, MUTHUKUMARAN D, AUBLIN P,et al. Spectre attack against SGX enclave[Z], 2018.
|
[28] |
VAN SCHAIK S, MILBURN A, OSTERLUND S,et al. RIDL: rogue in-flight data load[Z], 2019.
|
[29] |
VAN SCHAIK S, MINKIN M, KWONG A,et al. CacheOut: leaking data on intel CPUs via Cache Evictions[Z], 2020.
|
[30] |
RAGAB H, MILBURN A, RAZAVI H,et al. CROSSTALK: speculative data leaks across cores are real[Z], 2021.
|
[31] |
SCHAIK S, KWONG A, GENKIN D,et al. SGAxe : how SGX fails in practice[Z], 2020.
|
[32] |
DAMGRD I, PASTRO V, SMART N P, et al. Multiparty computation from somewhat homomorphic encryption[M]. Annual Cryptology Conference, 2012.
|
[33] |
KOTI N, PANCHOLI M, PATRA A, et al. SWIFT: super-fast and robust privacy-preserving machine learning[C]. 30th USENIX Security Symposium, USENIX Security, 2021.
|
[34] |
GOLDSCHMIDT R E. Applications of division by convergence[J]. Massachusetts Institute of Technology, 2005.
|