Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Fusion++: Volumetric object-level slam

J McCormac, R Clark, M Bloesch… - … conference on 3D …, 2018 - ieeexplore.ieee.org
We propose an online object-level SLAM system which builds a persistent and accurate 3D
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …

DAWG: A defense against cache timing attacks in speculative execution processors

V Kiriansky, I Lebedev, S Amarasinghe… - 2018 51st Annual …, 2018 - ieeexplore.ieee.org
Software side channel attacks have become a serious concern with the recent rash of
attacks on speculative processor architectures. Most attacks that have been demonstrated …

Sanctum: Minimal hardware extensions for strong software isolation

V Costan, I Lebedev, S Devadas - 25th USENIX Security Symposium …, 2016 - usenix.org
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …

Cache template attacks: Automating attacks on inclusive {Last-Level} caches

D Gruss, R Spreitzer, S Mangard - 24th USENIX Security Symposium …, 2015 - usenix.org
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …

{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud

T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …

Mi6: Secure enclaves in a speculative out-of-order processor

T Bourgeat, I Lebedev, A Wright, S Zhang… - Proceedings of the …, 2019 - dl.acm.org
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …

Homealone: Co-residency detection in the cloud via side-channel analysis

Y Zhang, A Juels, A Oprea… - 2011 IEEE symposium on …, 2011 - ieeexplore.ieee.org
Security is a major barrier to enterprise adoption of cloud computing. Physical co-residency
with other tenants poses a particular risk, due to pervasive virtualization in the cloud. Recent …

A software approach to defeating side channels in last-level caches

Z Zhou, MK Reiter, Y Zhang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
We present a software approach to mitigate access-driven side-channel attacks that
leverage last-level caches (LLCs) shared across cores to leak information between security …