Verifiable delegation of computation on outsourced data
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …
server in such a way that, at any moment, the client can ask the server to compute a function …
Caches and hash trees for efficient memory integrity verification
We study the hardware cost of implementing hash-tree based verification of untrusted
external memory by a high performance processor. This verification could enable …
external memory by a high performance processor. This verification could enable …
Efficient memory integrity verification and encryption for secure processors
Secure processors enable new sets of applications such as commercial grid computing,
software copy-protection, and secure mobile agents by providing security from both physical …
software copy-protection, and secure mobile agents by providing security from both physical …
Physical random functions
B Gassend - 2003 - dspace.mit.edu
In general, secure protocols assume that participants are able to maintain secret key
information. In practice, this assumption is often incorrect as an increasing number of …
information. In practice, this assumption is often incorrect as an increasing number of …
[PDF][PDF] Twin clouds: An architecture for secure cloud computing
Cloud computing promises a more cost effective enabling technology to outsource storage
and computations. Existing approaches for secure outsourcing of data and arbitrary …
and computations. Existing approaches for secure outsourcing of data and arbitrary …
Protecting software code by guards
H Chang, MJ Atallah - ACM Workshop on Digital Rights Management, 2001 - Springer
Protection of software code against illegitimate modifications by its users is a pressing issue
to many software developers. Many software-based mechanisms for protecting program …
to many software developers. Many software-based mechanisms for protecting program …
Building the IBM 4758 secure coprocessor
JG Dyer, M Lindemann, R Perez, R Sailer… - Computer, 2001 - ieeexplore.ieee.org
Meeting the challenge of building a user-configurable secure coprocessor provided several
lessons in hardware and software development and continues to spur further research. In …
lessons in hardware and software development and continues to spur further research. In …
Systems and methods for preventing unauthorized modification of an operating system
Abstract Systems and methods are provided for preventing unauthorized modification of an
operating system. The system includes an operating system comprised of kernel code for …
operating system. The system includes an operating system comprised of kernel code for …
Sgxio: Generic trusted i/o path for intel sgx
S Weiser, M Werner - Proceedings of the seventh ACM on conference …, 2017 - dl.acm.org
Application security traditionally strongly relies upon security of the underlying operating
system. However, operating systems often fall victim to software attacks, compromising …
system. However, operating systems often fall victim to software attacks, compromising …
Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming
more and more important. Pure cryptographic solutions based on fully homomorphic and …
more and more important. Pure cryptographic solutions based on fully homomorphic and …