T. Alves and D. Felton, TrustZone: Integrated Hardware and Software Security-Enabling Trusted Computing in Embedded Systems, 2004.

S. Brenner, Confidential ZooKeeper using Intel SGX. Middleware, 2016.

V. Costan and S. Devadas, Intel SGX Explained. IACR Cryptology ePrint Archive, vol.086, pp.1-118, 2016.

B. Fuhry, Practical and secure index with SGX. IFIP Annual Conference on Data and Applications Security and Privacy, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01684366

P. Kocher, Spectre attacks: Exploiting speculative execution, S&P, 2019.

. Lipp and . Moritz, Reading Kernel Memory from User Space. USENIX Security Symposium, 2018.

F. Mckeen, Innovative instructions and software model for isolated execution, HASP@ ISCA, vol.10, 2013.

C. Priebe, K. Vaswani, and M. Costa, EnclaveDB: A Secure Database using SGX. EnclaveDB: A Secure Database using SGX, 2018.

J. Van-bulck, Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution, USENIX Security Symposium, 2018.

C. Zhao, On the Performance of Intel SGX, IEEE Web Inf. Systems and Applications Conf, 2016.