A security analysis of blockchain-based did services
Decentralized identifiers (DID) has shown great potential for sharing user identities across
different domains and services without compromising user privacy. DID is designed to …
different domains and services without compromising user privacy. DID is designed to …
{FABRID}: Flexible {Attestation-Based} Routing for {Inter-Domain} Networks
In its current state, the Internet does not provide end users with transparency and control
regarding on-path forwarding devices. In particular, the lack of network device information …
regarding on-path forwarding devices. In particular, the lack of network device information …
{SENG}, the {SGX-Enforcing} Network Gateway: Authorizing Communication from Shielded Clients
Network administrators face a security-critical dilemma. While they want to tightly contain
their hosts, they usually have to relax firewall policies to support a large variety of …
their hosts, they usually have to relax firewall policies to support a large variety of …
TrustedGateway: TEE-assisted routing and firewall enforcement using ARM TrustZone
F Schwarz - Proceedings of the 25th International Symposium on …, 2022 - dl.acm.org
Gateway routers are at the heart of every network infrastructure, interconnecting
subnetworks and enforcing access control policies using firewalls. However, their central …
subnetworks and enforcing access control policies using firewalls. However, their central …
GUARDBOX: A high-performance middlebox providing confidentiality and integrity for packets
M Zhan, Y Li, G Yu, Y Zhang, B Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The deepening of digital transformation has led to an increasing amount of data from
industries being transmitted over the Internet. However, packets in plaintext originally …
industries being transmitted over the Internet. However, packets in plaintext originally …
TEE-based designs for network gateways, web authentication, and VM introspection
FF Schwarz - 2024 - publikationen.sulb.uni-saarland.de
Over the last decades, the complexity of client, server, and network devices has drastically
increased---and so has the number of sophisticated attacks against them. New …
increased---and so has the number of sophisticated attacks against them. New …