Cryptographic processors-a survey

R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

{SCONE}: Secure linux containers with intel {SGX}

S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016 - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Lest we remember: cold-boot attacks on encryption keys

JA Halderman, SD Schoen, N Heninger… - Communications of the …, 2009 - dl.acm.org
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …

Glamdring: Automatic application partitioning for intel {SGX}

J Lind, C Priebe, D Muthukumaran, D O'Keeffe… - 2017 USENIX Annual …, 2017 - usenix.org
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves, can protect
applications in untrusted environments. While prior work has shown that legacy applications …

Trustworthy {Whole-System} provenance for the linux kernel

A Bates, DJ Tian, KRB Butler, T Moyer - 24th USENIX Security …, 2015 - usenix.org
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

Design and implementation of a TCG-based integrity measurement architecture.

R Sailer, X Zhang, T Jaeger, L Van Doorn - USENIX Security symposium, 2004 - usenix.org
We present the design and implementation of a secure integrity measurement system for
Linux. All executable content that is loaded onto the Linux system is measured before …

Terra: A virtual machine-based platform for trusted computing

T Garfinkel, B Pfaff, J Chow, M Rosenblum… - Proceedings of the …, 2003 - dl.acm.org
We present a flexible architecture for trusted computing, called Terra, that allows
applications with a wide range of security requirements to run simultaneously on commodity …

TrustedDB: a trusted hardware based database with privacy and data confidentiality

S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …