A security analysis of blockchain-based did services

BG Kim, YS Cho, SH Kim, H Kim, SS Woo - IEEE Access, 2021 - ieeexplore.ieee.org
Decentralized identifiers (DID) has shown great potential for sharing user identities across
different domains and services without compromising user privacy. DID is designed to …

{FABRID}: Flexible {Attestation-Based} Routing for {Inter-Domain} Networks

C Krähenbühl, M Wyss, D Basin, V Lenders… - 32nd USENIX Security …, 2023 - usenix.org
In its current state, the Internet does not provide end users with transparency and control
regarding on-path forwarding devices. In particular, the lack of network device information …

{SENG}, the {SGX-Enforcing} Network Gateway: Authorizing Communication from Shielded Clients

F Schwarz, C Rossow - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Network administrators face a security-critical dilemma. While they want to tightly contain
their hosts, they usually have to relax firewall policies to support a large variety of …

TrustedGateway: TEE-assisted routing and firewall enforcement using ARM TrustZone

F Schwarz - Proceedings of the 25th International Symposium on …, 2022 - dl.acm.org
Gateway routers are at the heart of every network infrastructure, interconnecting
subnetworks and enforcing access control policies using firewalls. However, their central …

GUARDBOX: A high-performance middlebox providing confidentiality and integrity for packets

M Zhan, Y Li, G Yu, Y Zhang, B Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The deepening of digital transformation has led to an increasing amount of data from
industries being transmitted over the Internet. However, packets in plaintext originally …

TEE-based designs for network gateways, web authentication, and VM introspection

FF Schwarz - 2024 - publikationen.sulb.uni-saarland.de
Over the last decades, the complexity of client, server, and network devices has drastically
increased---and so has the number of sophisticated attacks against them. New …