SBOM. EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java

A Sharma, M Wittlinger, B Baudry… - arXiv preprint arXiv …, 2024 - arxiv.org
Software supply chain attacks have become a significant threat as software development
increasingly relies on contributions from multiple, often unverified sources. The code from …

Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage

H Qiao, H Ba, H Zhou, Z Wang, J Ren, Y Hu - Symmetry, 2018 - mdpi.com
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a
public cloud infrastructure. In the CCS system, a user can define and manage the access …

Astrape: An efficient concurrent cloud attestation with ciphertext-policy attribute-based encryption

H Ba, H Zhou, S Mei, H Qiao, T Hong, Z Wang, J Ren - Symmetry, 2018 - mdpi.com
Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go
computing capability and brings enormous benefits, but there are numerous organizations …

Double level Code Scanning Leveraging network virtualization to decrease risks of memory starvation and insecure programming

T Albibrahim, S Hendaoui - 2023 - researchsquare.com
This study investigates the impact of a software-defined networking (SDN) controller on
resource utilization, system stability, and performance in cloud environments, with a specific …

[PDF][PDF] Double Level Code Scanning Leveraging Network virtualization and Machine Learning to Mitigate Memory Starvation Risks and Insecure Programming

T Alibrahim, S Hendaoui - 2023 - assets-eu.researchsquare.com
In this study, we investigate the role of software-defined networking (SDN) controller on
memory usage, system stability, and performance in cloud computing networks, with a …