VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while keeping their code and data secret, and ensuring the …
computations in the cloud while keeping their code and data secret, and ensuring the …
Kaslr is dead: long live kaslr
Modern operating system kernels employ address space layout randomization (ASLR) to
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Code reuse attacks such as return-oriented programming (ROP) have become prevalent
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
System and method for improving internet communication by using intermediate nodes
D Shribman, O Vilenski - US Patent 9,241,044, 2016 - Google Patents
First worldwide family litigation filed litigation https://patents. darts-ip. com/? family=
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR
Modern operating systems use hardware support to protect against control-flow hijacking
attacks such as code-injection attacks. Typically, write access to executable pages is …
attacks such as code-injection attacks. Typically, write access to executable pages is …
RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …
bulk data operations do not require any computation, current systems transfer a large …
[PDF][PDF] Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Covert channels evade isolation mechanisms between multiple parties in the cloud.
Especially cache covert channels allow the transmission of several hundred kilobits per …
Especially cache covert channels allow the transmission of several hundred kilobits per …
System and method for improving internet communication by using intermediate nodes
D Shribman, O Vilenski - US Patent 9,742,866, 2017 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
System and method for securely connecting to a peripheral device
G Litichever, O Gutentag, E Zvuluny… - US Patent …, 2019 - Google Patents
Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …
System and method for improving internet communication by using intermediate nodes
D Shribman, O Vilenski - US Patent 10,659,562, 2020 - Google Patents
A method for fetching a content from a web server to a client device is disclosed, using
tunnel devices serving as intermediate devices. The client device accesses an acceleration …
tunnel devices serving as intermediate devices. The client device accesses an acceleration …