Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Caches and hash trees for efficient memory integrity verification

B Gassend, GE Suh, D Clarke… - … Symposium on High …, 2003 - ieeexplore.ieee.org
We study the hardware cost of implementing hash-tree based verification of untrusted
external memory by a high performance processor. This verification could enable …

Efficient memory integrity verification and encryption for secure processors

GE Suh, D Clarke, B Gasend… - … . 36th Annual IEEE …, 2003 - ieeexplore.ieee.org
Secure processors enable new sets of applications such as commercial grid computing,
software copy-protection, and secure mobile agents by providing security from both physical …

Physical random functions

B Gassend - 2003 - dspace.mit.edu
In general, secure protocols assume that participants are able to maintain secret key
information. In practice, this assumption is often incorrect as an increasing number of …

[PDF][PDF] Twin clouds: An architecture for secure cloud computing

S Bugiel, S Nurnberger, A Sadeghi… - … on cryptography and …, 2011 - cachin.com
Cloud computing promises a more cost effective enabling technology to outsource storage
and computations. Existing approaches for secure outsourcing of data and arbitrary …

Protecting software code by guards

H Chang, MJ Atallah - ACM Workshop on Digital Rights Management, 2001 - Springer
Protection of software code against illegitimate modifications by its users is a pressing issue
to many software developers. Many software-based mechanisms for protecting program …

Building the IBM 4758 secure coprocessor

JG Dyer, M Lindemann, R Perez, R Sailer… - Computer, 2001 - ieeexplore.ieee.org
Meeting the challenge of building a user-configurable secure coprocessor provided several
lessons in hardware and software development and continues to spur further research. In …

Systems and methods for preventing unauthorized modification of an operating system

A Seshadri, N Qu, A Perrig - US Patent 8,578,483, 2013 - Google Patents
Abstract Systems and methods are provided for preventing unauthorized modification of an
operating system. The system includes an operating system comprised of kernel code for …

Sgxio: Generic trusted i/o path for intel sgx

S Weiser, M Werner - Proceedings of the seventh ACM on conference …, 2017 - dl.acm.org
Application security traditionally strongly relies upon security of the underlying operating
system. However, operating systems often fall victim to software attacks, compromising …

Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency

AR Sadeghi, T Schneider, M Winandy - … 2010, Berlin, Germany, June 21-23 …, 2010 - Springer
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming
more and more important. Pure cryptographic solutions based on fully homomorphic and …