References
[1] California consumer privacy act (CCPA).
https://oag.ca.gov/privacy/ccpa.
[2] The EU general data protection regulation (GDPR).
https://eugdpr.org/.
[3] SGX-LKL library OS for running Linux applications
inside of Intel SGX enclaves.
https://github.com/lsds/sgx-lkl, 2019.
[4] Amazon. AWS Nitro Enclaves: Create additional
isolation to further protect highly sensitive data within
EC2 instances. https:
//aws.amazon.com/ec2/nitro/nitro-enclaves/.
[5] ARM. ARM security technology: Building a secure
system using TrustZone technology. White paper, 2008.
[6] M. Backes, M. Barbosa, D. Fiore, and R. M. Reischuk.
ADSNARK: Nearly practical and privacy-preserving
proofs on authenticated data. In IEEE Symposium on
Security and Privacy (S&P), 2015.
[7] R. Barry and D. Volz. Ghosts in the Clouds: Inside
China’s Major Corporate Hack. The Wall Street
Journal, Dec. 2019. https://www.wsj.com/
articles/ghosts-in-the-clouds-inside-
chinas-major-corporate-hack-11577729061.
[8] B. Baruah and S. Dhal. A two-factor authentication
scheme against FDM attack in IFTTT based Smart
Home System. Computers & Security, 77:21–35, 2018.
[9] E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza.
Succinct non-interactive zero knowledge for a von
Neumann architecture. In USENIX Security
Symposium, 2014.
[10] B. Bond, C. Hawblitzel, M. Kapritsos, K. R. M. Leino,
J. R. Lorch, B. Parno, A. Rane, S. Setty, and
L. Thompson. Vale: Verifying high-performance
cryptographic assembly code. In USENIX Security
Symposium, 2017.
[11] B. Braun, A. J. Feldman, Z. Ren, S. Setty, A. J.
Blumberg, and M. Walfish. Verifying computations
with state. In ACM Symposium on Operating Systems
Principles (SOSP), 2013.
[12]
G. Campagna, R. Ramesh, S. Xu, M. Fischer, and M. S.
Lam. Almond: The architecture of an open,
crowdsourced, privacy-preserving, programmable
virtual assistant. In International World Wide Web
Conference (WWW), 2017.
[13] N. Chandran, W. Chongchitmate, R. Ostrovsky, and
I. Visconti. Universally composable secure
computation with corrupted tokens. In Advances in
Cryptology—CRYPTO, 2019.
[14] H. Chen, D. Ziegler, T. Chajed, A. Chlipala, M. F.
Kaashoek, and N. Zeldovich. Using Crash Hoare logic
for certifying the FSCQ file system. In ACM
Symposium on Operating Systems Principles (SOSP),
2015.
[15]
A. Chiesa, E. Tromer, and M. Virza. Cluster computing
in zero knowledge. In Annual International Conference
on the Theory and Applications of Cryptographic
Techniques (EUROCRYPT), 2015.
[16]
I. Chillotti, N. Gama, M. Georgieva, and M. Izabachene.
Faster fully homomorphic encryption: Bootstrapping in
less than 0.1 seconds. In International Conference on
the Theory and Application of Cryptology and
Information Security (ASIACRYPT), 2016.
[17]
I. Chillotti, N. Gama, M. Georgieva, and M. Izabach
`
ene.
TFHE: Fast fully homomorphic encryption over the
torus. Journal of Cryptology, 33(1):34–91, 2020.
[18] O. M. Committee. OpenSSL.
https://www.openssl.org, 2018.
[19] G. Corfield. Vengeful sacked IT bod destroyed
ex-employer’s AWS cloud accounts. Now he’ll spent
rest of 2019 in the clink. The Register, Mar. 2019.
https://www.theregister.co.uk/2019/03/20/
steffan_needham_aws_rampage_prison_
sentence_voova/.
[20] V. Costan and S. Devadas. Intel SGX explained.
Cryptology ePrint Archive, Report 86, 2016.
[21] C. Costello, C. Fournet, J. Howell, M. Kohlweiss,
B. Kreuter, M. Naehrig, B. Parno, and S. Zahur.
Geppetto: Versatile verifiable computation. In IEEE
Symposium on Security and Privacy (S&P), May 2015.
[22] P. J. Denning. Fault tolerant operating systems. ACM
Computing Surveys (CSUR), 8(4):359–389, 1976.
[23] C. Dixon, R. Mahajan, S. Agarwal, A. Brush, B. Lee,
S. Saroiu, and P. Bahl. An operating system for the
home. In USENIX Symposium on Networked Systems
Design and Implementation (NSDI), 2012.
[24] E. Fernandes, J. Jung, and A. Prakash. Security
analysis of emerging smart home applications. In IEEE
Symposium on Security and Privacy (S&P), 2016.
[25] E. Fernandes, J. Jung, and A. Prakash. Decentralized
action integrity for trigger-action IoT platforms. In
Network and Distributed System Security Symposium
(NDSS), 2018.
[26] E. Fernandes, A. Rahmati, J. Jung, and A. Prakash.
Decoupled-IFTTT: Constraining privilege in
trigger-action platforms for the internet of things. arXiv
preprint arXiv:1707.00405, 2017.
[27] A. Ferraiuolo, A. Baumann, C. Hawblitzel, and
B. Parno. Komodo: Using verification to disentangle
secure-enclave hardware from software. In ACM
Symposium on Operating Systems Principles (SOSP),
2017.
[28]
P. Fonseca, K. Zhang, X. Wang, and A. Krishnamurthy.
An empirical study on the correctness of formally
verified distributed systems. In ACM European
Conference on Computer Systems (EuroSys), 2017.
[29] P. S. Foundation. Python Requests.
https://requests.readthedocs.io/en/master/,
2017.
17