Challenges and approaches to scaling the global commons

F Fritsch, J Emmett, E Friedman, R Kranjc… - Frontiers in …, 2021 - frontiersin.org
The re-emergence of commoning over the last decades is not incidental, but rather
indicative of a large-scale transition to a more “generative” organization of society that is …

An in-depth security and performance investigation in hyperledger fabric-configured distributed computing systems

S Quamara, AK Singh - International Journal of Computing and …, 2023 - journals.uob.edu.bh
Since its inception as one of the Bitcoin's underpinning technologies, the concept of
Blockchain has traversed a long way from being merely a secure distributed ledger meant …

Mitigating iot botnet ddos attacks through mud and ebpf based traffic filtering

A Feraudo, DA Popescu, P Yadav, R Mortier… - Proceedings of the 25th …, 2024 - dl.acm.org
As the prevalence of Internet-of-Things (IoT) devices becomes more and more dominant, so
too do the associated management and security challenges. One such challenge is the …

Spacelord: Private and Secure Smart Space Sharing

Y Bae, S Banerjee, S Lee, M Peinado - Digital Threats: Research and …, 2024 - dl.acm.org
Space sharing services like vacation rentals and meeting rooms are being equipped with
smart devices such as cameras, door locks and many other sensors. However, the sharing …

Chors: Hardening high-assurance security systems with trusted computing

W Ozga, R Faqeh, DL Quoc, F Gregor… - Proceedings of the 37th …, 2022 - dl.acm.org
High-assurance security systems require strong isolation from the untrusted world to protect
the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …

dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone

T Sun, B Li, Y Teng, Y Gao… - 2024 23rd ACM/IEEE …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications have recently been widely used in safety-critical
scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware …

PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location

M Michele, P Jattke, J Zibung, K Razavi - International Conference on …, 2024 - Springer
The smartphone location is the basis for a plethora of popular applications, such as traffic
navigation, games, and geotagging. Since the user can manipulate the reported location, it …

SecureLease: Maintaining Execution Control in The Wild using Intel SGX

S Kumar, A Panda, SR Sarangi - Proceedings of the 23rd ACM/IFIP …, 2022 - dl.acm.org
Modern software programs have dedicated license-check modules that restrict access to
users, who possess valid credentials. They also have a large number of add-on pluggable …

[PDF][PDF] Hardening High-Assurance Security Systems with Trusted Computing

W Ozga - 2022 - core.ac.uk
We are living in the time of the digital revolution in which the world we know changes
beyond recognition every decade. The positive aspect is that these changes also drive the …