Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
{PatchVerif}: Discovering Faulty Patches in Robotic Vehicles
Modern software is continuously patched to fix bugs and security vulnerabilities. Patching is
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …
Runtime software patching: Taxonomy, survey and future directions
Runtime software patching aims to minimize or eliminate service downtime, user
interruptions and potential data losses while deploying a patch. Due to modern software …
interruptions and potential data losses while deploying a patch. Due to modern software …
Hot Fixing Software: A Comprehensive Review of Terminology, Techniques, and Applications
A hot fix is an improvement to a specific time-critical issue deployed to a software system in
production. While hot fixing is an essential and common activity in software maintenance, it …
production. While hot fixing is an essential and common activity in software maintenance, it …
Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices
K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …
maintained by a remote server to enforce security updates, ideally through machine-to …
Hot Patching Hot Fixes: Reflection and Perspectives
With our reliance on software continuously increasing, it is of utmost importance that it be
reliable. However, complete prevention of bugs in live systems is unfortunately an …
reliable. However, complete prevention of bugs in live systems is unfortunately an …
Smile: Secure memory introspection for live enclave
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
A practical approach for updating an integrity-enforced operating system
Trusted computing defines how to securely measure, store, and verify the integrity of
software controlling a computer. One of the major challenge that make them hard to be …
software controlling a computer. One of the major challenge that make them hard to be …
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
Linux-based hypervisors in the cloud server suffer from an increasing number of
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB
T Takemura, R Yamamoto, K Suzaki - IEEE Access, 2024 - ieeexplore.ieee.org
AI&IoT edge devices run complex applications and are under the threat of stealthy attacks
that are not easily detected by traditional security systems. Provenance auditing is a …
that are not easily detected by traditional security systems. Provenance auditing is a …