Varys: Protecting {SGX} Enclaves from Practical {Side-Channel} Attacks
Numerous recent works have experimentally shown that Intel Software Guard Extensions
(SGX) are vulnerable to cache timing and page table side-channel attacks which could be …
(SGX) are vulnerable to cache timing and page table side-channel attacks which could be …
SGXBOUNDS: Memory safety for shielded execution
D Kuvaiskii, O Oleksenko, S Arnautov, B Trach… - Proceedings of the …, 2017 - dl.acm.org
Shielded execution based on Intel SGX provides strong security guarantees for legacy
applications running on untrusted platforms. However, memory safety attacks such as …
applications running on untrusted platforms. However, memory safety attacks such as …
{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …
and integrity properties, but also ensures data freshness to protect against rollback/forking …
Clemmys: Towards secure remote execution in faas
B Trach, O Oleksenko, F Gregor, P Bhatotia… - Proceedings of the 12th …, 2019 - dl.acm.org
We introduce Clemmys, a security-first serverless platform that ensures confidentiality and
integrity of users' functions and data as they are processed on untrusted cloud premises …
integrity of users' functions and data as they are processed on untrusted cloud premises …
Fecbench: A holistic interference-aware approach for application performance modeling
Services hosted in multi-tenant cloud platforms often encounter performance interference
due to contention for non-partitionable resources, which in turn causes unpredictable …
due to contention for non-partitionable resources, which in turn causes unpredictable …
Enabling reproducible and agile full-system simulation
Running experiments in modern computer architecture simulators can be a difficult and error-
prone endeavor. Users must track many configurations, components and outputs between …
prone endeavor. Users must track many configurations, components and outputs between …
Tee-perf: A profiler for trusted execution environments
M Bailleu, D Dragoti, P Bhatotia… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
We introduce TEE-PERF, an architecture-and platform-independent performance
measurement tool for trusted execution environments (TEEs). More specifically, TEE-PERF …
measurement tool for trusted execution environments (TEEs). More specifically, TEE-PERF …
Dscope: Detecting real-world data corruption hang bugs in cloud server systems
Cloud server systems such as Hadoop and Cassandra have enabled many real-world data-
intensive applications running inside computing clouds. However, those systems present …
intensive applications running inside computing clouds. However, those systems present …
FaultSee: reproducible fault injection in distributed systems
Distributed systems are increasingly important in modern society, often operating on a
global scale with stringent dependability requirements. Despite the vast amount of research …
global scale with stringent dependability requirements. Despite the vast amount of research …
Secure storage systems for untrusted cloud environments
M Bailleu - 2023 - era.ed.ac.uk
The cloud has become established for applications that need to be scalable and highly
available. However, moving data to data centers owned and operated by a third party, ie, the …
available. However, moving data to data centers owned and operated by a third party, ie, the …