Evolution of attacks, threat models, and solutions for virtualized systems
D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
A comprehensive survey of hardware-assisted security: From the edge to the cloud
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …
control. In the Internet of Things world, for example, the security of data could be posed at …
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Attackers target many different types of computer systems in use today, exploiting software
vulnerabilities to take over the device and make it act maliciously. Reports of numerous …
vulnerabilities to take over the device and make it act maliciously. Reports of numerous …
Secure free-floating car sharing for offline cars
A Dmitrienko, C Plappert - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
In this paper, we present a new access control system for free-floating car sharing, which
achieves a number of appealing features not available in the state-of-the-art solutions. First …
achieves a number of appealing features not available in the state-of-the-art solutions. First …
Recent trends in applying TPM to cloud computing
Trusted platform modules (TPM) have become important safe‐guards against variety of
software‐based attacks. By providing a limited set of cryptographic services through a well …
software‐based attacks. By providing a limited set of cryptographic services through a well …
TROS: Protecting Humanoids ROS from Privileged Attackers
The spread adoption of humanoid social robots in different application fields is growing the
interest of hackers who could violate the privacy of people, or—even worse—threaten …
interest of hackers who could violate the privacy of people, or—even worse—threaten …
Trusted validation for geolocation of cloud data
DL Fu, XG Peng, YL Yang - The Computer Journal, 2015 - ieeexplore.ieee.org
It is certain that cloud users are eager to ascertain where their sensitive data are stored.
Misplacing the data probably divulges secret information. Therefore, researchers have …
Misplacing the data probably divulges secret information. Therefore, researchers have …
Chors: Hardening high-assurance security systems with trusted computing
High-assurance security systems require strong isolation from the untrusted world to protect
the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …
the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …
Towards an end-to-end architecture for run-time data protection in the cloud
Protecting sensitive data is a key concern for the adoption of cloud solutions. Protecting data
in the cloud is made particularly challenging by the dynamic changes that cloud systems …
in the cloud is made particularly challenging by the dynamic changes that cloud systems …
Virtualization airborne trusted general computing technology
S Zhang, Y Wang, X Wan, Z Li, Y Guo - Applied Sciences, 2023 - mdpi.com
Aircraft information service systems, such as airborne information systems, airborne
integrated maintenance management systems, and cabin management systems, have …
integrated maintenance management systems, and cabin management systems, have …