Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Confidential computing for OpenPOWER

GDH Hunt, R Pai, MV Le, H Jamjoom… - Proceedings of the …, 2021 - dl.acm.org
This paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted
Execution Environment (TEE) for confidential computing on Power ISA. PEF enables …

Performance analysis of scientific computing workloads on general purpose tees

A Akram, A Giannakou, V Akella… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Scientific computing sometimes involves computation on sensitive data. Depending on the
data and the execution environment, the HPC (high-performance computing) user or data …

Data station: delegated, trustworthy, and auditable computation to enable data-sharing consortia with a data escrow

S Xia, Z Zhu, C Zhu, J Zhao, K Chard, AJ Elmore… - arXiv preprint arXiv …, 2023 - arxiv.org
Pooling and sharing data increases and distributes its value. But since data cannot be
revoked once shared, scenarios that require controlled release of data for regulatory …

What is the price for joining securely? benchmarking equi-joins in trusted execution environments

K Maliszewski, JA Quiané-Ruiz, J Traub… - Proceedings of the VLDB …, 2021 - dl.acm.org
Protection of personal data has been raised to be among the top requirements of modern
systems. At the same time, it is now frequent that the owner of the data and the owner of the …

IChannels: Exploiting current management mechanisms to create covert channels in modern processors

J Haj-Yahya, L Orosa, JS Kim, JG Luna… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
To operate efficiently across a wide range of workloads with varying power requirements, a
modern processor applies different current management mechanisms, which briefly throttle …

Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves

P Antonino, A Derek, WA Wołoszyn - IEEE access, 2023 - ieeexplore.ieee.org
We propose a protocol that explores a synergy between two TEE implementations: it brings
SGX-like remote attestation to SEV VMs. We use the notion of a trusted guest owner …

Using Trusted Execution Environments for Secure Stream Processing of Medical Data: (Case Study Paper)

C Segarra, R Delgado-Gonzalo, M Lemay… - … 2019, Held as Part of the …, 2019 - Springer
Processing sensitive data, such as those produced by body sensors, on third-party untrusted
clouds is particularly challenging without compromising the privacy of the users generating …

MQT-TZ: Hardening IoT brokers using ARM TrustZone:(practical experience report)

C Segarra, R Delgado-Gonzalo… - … Symposium on Reliable …, 2020 - ieeexplore.ieee.org
The publish-subscribe paradigm is an efficient communication scheme with strong
decoupling between the nodes, that is especially fit for large-scale deployments. It adapts …