Cryptographic processors-a survey
R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
usage policies. Their origins lie with military cipher machines and PIN processing in banking …
Evolution of attacks, threat models, and solutions for virtualized systems
D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
{SCONE}: Secure linux containers with intel {SGX}
S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016 - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger… - Communications of the …, 2009 - dl.acm.org
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …
modern computers, retains its contents for several seconds after power is lost, even at room …
Glamdring: Automatic application partitioning for intel {SGX}
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves, can protect
applications in untrusted environments. While prior work has shown that legacy applications …
applications in untrusted environments. While prior work has shown that legacy applications …
Trustworthy {Whole-System} provenance for the linux kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …
history of each object being processed on the system, allowing users to understand how …
Design and implementation of a TCG-based integrity measurement architecture.
R Sailer, X Zhang, T Jaeger, L Van Doorn - USENIX Security symposium, 2004 - usenix.org
We present the design and implementation of a secure integrity measurement system for
Linux. All executable content that is loaded onto the Linux system is measured before …
Linux. All executable content that is loaded onto the Linux system is measured before …
Terra: A virtual machine-based platform for trusted computing
T Garfinkel, B Pfaff, J Chow, M Rosenblum… - Proceedings of the …, 2003 - dl.acm.org
We present a flexible architecture for trusted computing, called Terra, that allows
applications with a wide range of security requirements to run simultaneously on commodity …
applications with a wide range of security requirements to run simultaneously on commodity …
TrustedDB: a trusted hardware based database with privacy and data confidentiality
S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …
with privacy and under regulatory compliance constraints without having to trust the service …