VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while keeping their code and data secret, and ensuring the …

Kaslr is dead: long live kaslr

D Gruss, M Lipp, M Schwarz, R Fellner… - … Secure Software and …, 2017 - Springer
Modern operating system kernels employ address space layout randomization (ASLR) to
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …

Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications

F Schuster, T Tendyck, C Liebchen… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Code reuse attacks such as return-oriented programming (ROP) have become prevalent
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …

System and method for improving internet communication by using intermediate nodes

D Shribman, O Vilenski - US Patent 9,241,044, 2016 - Google Patents
First worldwide family litigation filed litigation https://patents. darts-ip. com/? family=
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR

D Gruss, C Maurice, A Fogh, M Lipp… - Proceedings of the 2016 …, 2016 - dl.acm.org
Modern operating systems use hardware support to protect against control-flow hijacking
attacks such as code-injection attacks. Typically, write access to executable pages is …

RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization

V Seshadri, Y Kim, C Fallin, D Lee… - Proceedings of the 46th …, 2013 - dl.acm.org
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …

[PDF][PDF] Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.

C Maurice, M Weber, M Schwarz, L Giner, D Gruss… - NDSS, 2017 - cmaurice.fr
Covert channels evade isolation mechanisms between multiple parties in the cloud.
Especially cache covert channels allow the transmission of several hundred kilobits per …

System and method for improving internet communication by using intermediate nodes

D Shribman, O Vilenski - US Patent 9,742,866, 2017 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

System and method for securely connecting to a peripheral device

G Litichever, O Gutentag, E Zvuluny… - US Patent …, 2019 - Google Patents
Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …

System and method for improving internet communication by using intermediate nodes

D Shribman, O Vilenski - US Patent 10,659,562, 2020 - Google Patents
A method for fetching a content from a web server to a client device is disclosed, using
tunnel devices serving as intermediate devices. The client device accesses an acceleration …