Varys: Protecting {SGX} Enclaves from Practical {Side-Channel} Attacks

O Oleksenko, B Trach, R Krahn, M Silberstein… - 2018 Usenix Annual …, 2018 - usenix.org
Numerous recent works have experimentally shown that Intel Software Guard Extensions
(SGX) are vulnerable to cache timing and page table side-channel attacks which could be …

SGXBOUNDS: Memory safety for shielded execution

D Kuvaiskii, O Oleksenko, S Arnautov, B Trach… - Proceedings of the …, 2017 - dl.acm.org
Shielded execution based on Intel SGX provides strong security guarantees for legacy
applications running on untrusted platforms. However, memory safety attacks such as …

{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution

M Bailleu, J Thalheim, P Bhatotia, C Fetzer… - … USENIX Conference on …, 2019 - usenix.org
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …

Clemmys: Towards secure remote execution in faas

B Trach, O Oleksenko, F Gregor, P Bhatotia… - Proceedings of the 12th …, 2019 - dl.acm.org
We introduce Clemmys, a security-first serverless platform that ensures confidentiality and
integrity of users' functions and data as they are processed on untrusted cloud premises …

Fecbench: A holistic interference-aware approach for application performance modeling

YD Barve, S Shekhar, A Chhokra… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Services hosted in multi-tenant cloud platforms often encounter performance interference
due to contention for non-partitionable resources, which in turn causes unpredictable …

Enabling reproducible and agile full-system simulation

BR Bruce, A Akram, H Nguyen, K Roarty… - … Analysis of Systems …, 2021 - ieeexplore.ieee.org
Running experiments in modern computer architecture simulators can be a difficult and error-
prone endeavor. Users must track many configurations, components and outputs between …

Tee-perf: A profiler for trusted execution environments

M Bailleu, D Dragoti, P Bhatotia… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
We introduce TEE-PERF, an architecture-and platform-independent performance
measurement tool for trusted execution environments (TEEs). More specifically, TEE-PERF …

Dscope: Detecting real-world data corruption hang bugs in cloud server systems

T Dai, J He, X Gu, S Lu, P Wang - … of the ACM Symposium on Cloud …, 2018 - dl.acm.org
Cloud server systems such as Hadoop and Cassandra have enabled many real-world data-
intensive applications running inside computing clouds. However, those systems present …

FaultSee: reproducible fault injection in distributed systems

M Amaral, ML Pardal, H Mercier… - 2020 16th European …, 2020 - ieeexplore.ieee.org
Distributed systems are increasingly important in modern society, often operating on a
global scale with stringent dependability requirements. Despite the vast amount of research …

Secure storage systems for untrusted cloud environments

M Bailleu - 2023 - era.ed.ac.uk
The cloud has become established for applications that need to be scalable and highly
available. However, moving data to data centers owned and operated by a third party, ie, the …