Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

Hardware-based trusted computing architectures for isolation and attestation

P Maene, J Götzfried, R De Clercq… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Attackers target many different types of computer systems in use today, exploiting software
vulnerabilities to take over the device and make it act maliciously. Reports of numerous …

Secure free-floating car sharing for offline cars

A Dmitrienko, C Plappert - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
In this paper, we present a new access control system for free-floating car sharing, which
achieves a number of appealing features not available in the state-of-the-art solutions. First …

Recent trends in applying TPM to cloud computing

S Hosseinzadeh, B Sequeiros, PRM Inácio… - Security and …, 2020 - Wiley Online Library
Trusted platform modules (TPM) have become important safe‐guards against variety of
software‐based attacks. By providing a limited set of cryptographic services through a well …

TROS: Protecting Humanoids ROS from Privileged Attackers

G Mazzeo, M Staffa - International Journal of Social Robotics, 2020 - Springer
The spread adoption of humanoid social robots in different application fields is growing the
interest of hackers who could violate the privacy of people, or—even worse—threaten …

Trusted validation for geolocation of cloud data

DL Fu, XG Peng, YL Yang - The Computer Journal, 2015 - ieeexplore.ieee.org
It is certain that cloud users are eager to ascertain where their sensitive data are stored.
Misplacing the data probably divulges secret information. Therefore, researchers have …

Chors: Hardening high-assurance security systems with trusted computing

W Ozga, R Faqeh, DL Quoc, F Gregor… - Proceedings of the 37th …, 2022 - dl.acm.org
High-assurance security systems require strong isolation from the untrusted world to protect
the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …

Towards an end-to-end architecture for run-time data protection in the cloud

NG Mohammadi, ZA Mann, A Metzger… - 2018 44th Euromicro …, 2018 - ieeexplore.ieee.org
Protecting sensitive data is a key concern for the adoption of cloud solutions. Protecting data
in the cloud is made particularly challenging by the dynamic changes that cloud systems …

Virtualization airborne trusted general computing technology

S Zhang, Y Wang, X Wan, Z Li, Y Guo - Applied Sciences, 2023 - mdpi.com
Aircraft information service systems, such as airborne information systems, airborne
integrated maintenance management systems, and cabin management systems, have …