Optimized trusted execution for hard real-time applications on COTS processors

A Mukherjee, T Mishra, T Chantem, N Fisher… - Proceedings of the 27th …, 2019 - dl.acm.org
While trusted execution environments (TEE) provide industry standard security and isolation,
its implementation through secure monitor calls (SMC) attribute to large time overhead and …

Building and maintaining a third-party library supply chain for productive and secure SGX enclave development

P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou… - Proceedings of the …, 2020 - dl.acm.org
The big data industry is facing new challenges as concerns about privacy leakage soar. One
of the remedies to privacy breach incidents is to encapsulate computations over sensitive …

Client insourcing: Bringing ops in-house for seamless re-engineering of Full-Stack JavaScript Applications

K An, E Tilevich - Proceedings of The Web Conference 2020, 2020 - dl.acm.org
Modern web applications are distributed across a browser-based client and a cloud-based
server. Distribution provides access to remote resources, accessed over the web and shared …

RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints

Y Liu, K An, E Tilevich - Journal of Computer Languages, 2020 - Elsevier
Real-time systems must meet strict timeliness requirements. These systems also often need
to protect their critical program information (CPI) from adversarial interference and …

D-goldilocks: Automatic redistribution of remote functionalities for performance and efficiency

K An, E Tilevich - 2020 IEEE 27th International Conference on …, 2020 - ieeexplore.ieee.org
Distributed applications enhance their execution by using remote resources. However,
distributed execution incurs communication, synchronization, fault-handling, and security …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …

EdgStr: Automating Client-Cloud to Client-Edge-Cloud Transformation

K An, E Tilevich - 2024 IEEE 44th International Conference on …, 2024 - ieeexplore.ieee.org
To harness the potential of edge resources, two-tier client-cloud applications require
transformation into three-tier client-edge-cloud applications. Such transformations are hard …

SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX

J Huang, H Han, F Xu, B Chen - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
In the era of cloud computing, many applications are migrated to public servers not fully
controlled by users who may fear their critical operations or data from being compromised by …

Facilitating the evolutionary modifications in distributed apps via automated refactoring

K An - Web Engineering: 19th International Conference, ICWE …, 2019 - Springer
Actively used software applications must be changed continuously to ensure their utility,
correctness, and performance. To perform these changes, programmers spend a …

You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

M Hasan, S Mohan - arXiv preprint arXiv:2304.13956, 2023 - arxiv.org
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …