Fog computing security: a review of current applications and security solutions
S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …
computing resources on the edges of a network. It can be described as a cloud-like platform …
Security and privacy in cloud computing
Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
Fusion++: Volumetric object-level slam
We propose an online object-level SLAM system which builds a persistent and accurate 3D
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …
DAWG: A defense against cache timing attacks in speculative execution processors
Software side channel attacks have become a serious concern with the recent rash of
attacks on speculative processor architectures. Most attacks that have been demonstrated …
attacks on speculative processor architectures. Most attacks that have been demonstrated …
Sanctum: Minimal hardware extensions for strong software isolation
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …
strong provable isolation of software modules running concurrently and sharing resources …
Cache template attacks: Automating attacks on inclusive {Last-Level} caches
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …
information leakage. However, existing attacks require manual identification of …
{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud
T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …
availability, and on-demand scaling. To achieve these promises, cloud providers share …
Mi6: Secure enclaves in a speculative out-of-order processor
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
Homealone: Co-residency detection in the cloud via side-channel analysis
Security is a major barrier to enterprise adoption of cloud computing. Physical co-residency
with other tenants poses a particular risk, due to pervasive virtualization in the cloud. Recent …
with other tenants poses a particular risk, due to pervasive virtualization in the cloud. Recent …
A software approach to defeating side channels in last-level caches
We present a software approach to mitigate access-driven side-channel attacks that
leverage last-level caches (LLCs) shared across cores to leak information between security …
leverage last-level caches (LLCs) shared across cores to leak information between security …