Filters








42 Hits in 4.5 sec

Everything You Should Know about Intel SGX Performance on Virtualized Systems

Tu Dinh Ngoc, Bao Bui, Stella Bitchebe, Alain Tchana, Valerio Schiavoni, Pascal Felber, Daniel Hagimont
2019 Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems - SIGMETRICS '19  
Based on our findings, we identify several optimization strategies that would improve the performance of Intel SGX on such systems.  ...  This paper presents for the first time a detailed performance analysis of Intel SGX in a virtualized system in comparison with a bare-metal system.  ...  Based on these findings, we identified several optimization strategies that would improve the performance of Intel SGX on virtualized systems.  ... 
doi:10.1145/3309697.3331480 dblp:conf/sigmetrics/NgocBBTSFH19 fatcat:jukwiwi5vfhh3mq57x2fw4bmzm

IoT Software Security Building Blocks [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
Virtualization or SGX later).  ...  Threats to Operating Systems Operating systems run at the highest privilege level, with access to nearly everything on a platform.  ... 
doi:10.1007/978-1-4842-2896-8_4 fatcat:5ffon6fjtnh6rfkpnbtwoxk7ou

An Off-Chip Attack on Hardware Enclaves via the Memory Bus [article]

Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa
2019 arXiv   pre-print
We demonstrate Membuster on an Intel SGX CPU to leak confidential data from two applications: Hunspell and Memcached.  ...  Lastly, the attacker needs to reverse-engineer the translation between virtual, physical, and DRAM addresses to perform a robust attack.  ...  , Ericsson, Facebook, Google, Intel, Microsoft, Scotiabank, Splunk, and VMware.  ... 
arXiv:1912.01701v1 fatcat:nj6kipl65zewtd4tn6x6p6gzse

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
It includes a summary of the 5G threat landscape, the 5G networks classification criteria and their threat taxonomy; a description of security requirements of 5G systems, divided into domain-specific use  ...  cases, and the elicitation of security requirements from relevant stakeholders in 5G; the current status of 5G networks, the solutions state for securing 5G systems, the standardization effort in the  ...  Our knowledge and work on Intel SGX 2.0 enclave confirm that statement.  ... 
doi:10.5281/zenodo.3947893 fatcat:bg7jnn5ph5fv3gjp7pqacy3us4

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
identity must be used to set up mutually authenticated streams from the collection peripherals to the NVR VMS system; additionally the managed switch should perform access control on all connected devices  ...  The OS can also leverage the SGX for TEE applications and all the while enabling the in-band manageability features via Intel AMT.  ... 
doi:10.1007/978-1-4842-2896-8_6 fatcat:eznovqjwwbbn5a4czv3q5cj3cm

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
It includes a summary of the 5G threat landscape, the 5G networks classification criteria and their threat taxonomy; a description of security requirements of 5G systems, divided into domain-specific use  ...  cases, and the elicitation of security requirements from relevant stakeholders in 5G; the current status of 5G networks, the solutions state for securing 5G systems, the standardization effort in the  ...  Our knowledge and work on Intel SGX 2.0 enclave confirm that statement.  ... 
doi:10.5281/zenodo.4569519 fatcat:7aersbhzyrccrn563shazvj4dq

Intel's Embedded Solutions: from Management to Security [chapter]

Xiaoyu Ruan
2014 Platform Embedded Security Technology Revealed  
These techniques include a managed runtime environment (MRTE), tamperresistant software (TRS), a secure virtual machine (VM), Intel TXT, Intel Software Guard Extensions (Intel SGX), and so forth.  ...  Note ■ If multiple master devices are available on the embedded system, consider overlapped I/o to improve performance.  ... 
doi:10.1007/978-1-4302-6572-6_2 fatcat:753ovmpkhnfunpbxgyfbys2bni

Ipres 2017 Kyoto - Collaborative Notes

Michelle Lindlar, Joshua Ng, William Kilbride, Euan Cochrane, Jaye Weatherburn, Rachel Tropea
2018 Zenodo  
The document deposited here is considered version 1.0, captured on September 23rd 2018 with the last documented change in the Google Doc having been made on April 5th 2018.  ...  These are notes that were collabroatively taken during the 14th International Conference on Digital Preservation (iPRES), 25th - 29th September 2017 in Kyoto, Japan.  ...  Goal is to run encrypted content as VHD disk on Basilisk emulator Q: Is Intel SGX needed on the client side? If so, it will really limit the usage on the user side.  ... 
doi:10.5281/zenodo.1433826 fatcat:jzzbpahxdbeflabrwjnwljnsg4

ChainFaaS: An Open Blockchain-based Serverless Platform

Sara Ghaemi, Hamzeh Khazaei, Petr Musilek
2020 IEEE Access  
As a result, the need for building new data centers would be reduced with a positive impact on the environment.  ...  On the other hand, there are many underutilized personal computers around the world that can be used towards distributed computing.  ...  Both Golem and iExec are working on using Intel Software Guard Extensions (SGX) for isolation. Intel SGX offers hardware-level isolation, which is the most secure level.  ... 
doi:10.1109/access.2020.3010119 fatcat:o2t4wr5xbrefnjd5quhb4ulmvq

Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems

Antonio Lima, Francisco Rocha, Marcus Völp, Paulo Esteves-Veríssimo
2016 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy - CPS-SPC '16  
This position paper attempts at contributing to a better understanding of the global threat plane and the specific threat vectors designers should be attentive to.  ...  Although it remained undetected, adversaries knowing about such a flaw might well have exploited it to bring down or take over the system, in a non-detectable manner.  ...  Likewise, imagine that you are about to slowly enter an intersection with right-of-way (priority-to-the-right) and you establish eye contact with a faster driver coming from your left, and from the mutual  ... 
doi:10.1145/2994487.2994489 dblp:conf/ccs/LimaRVV16 fatcat:kcpquhekv5a55dfscuusxh433y

What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things [article]

Lorenzo Ghiro
2021 arXiv   pre-print
This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT.  ...  The concept of blockchain appears therefore blurred, as it is hard to believe that the same technology can empower applications that have extremely different requirements and exhibit dissimilar performance  ...  as Proof-of-Work . . . and assumes the use of Intel SGX as the trusted execution environment [144] .  ... 
arXiv:2102.03750v1 fatcat:dbsy76wid5dopdlt4ciut7cpdq

A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud

Marcela T. de Oliveira, Alexandros Bakas, Eugene Frimpong, Adrien E. D. Groot, Henk A. Marquering, Antonis Michalas, Silvia D. Olabarriaga
2020 Annales des télécommunications  
However, EMR storage and sharing through clouds raise several concerns about security and privacy.  ...  To this end, we propose a protocol through which all treatment teams involved in the emergency care can securely decrypt relevant data from the patient's EMR and add new information about the patient's  ...  System model The system model presented here is based on the model introduced in [18] .  ... 
doi:10.1007/s12243-020-00759-2 fatcat:luwucsnzmzdc3ab7dkuqbhzupm

Overcoming Security Challenges in Microservice Architectures

Tetiana Yarygina, Anya Helene Bagge
2018 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)  
Future research should therefore concentrate on resolving the existing conflicts. A natural progression of this work is to propose an architectural style that incorporates basic security principles.  ...  RESTUS partially addresses the security issues of the stateless resource constraint, but not the issues related to the cache and code-on-demand constraints.  ...  Disadvantages " A distributed system is one in which the failure of a computer you didn't even know existed can render your own computer unusable. " Leslie Lamport, 1987 Distributed systems are inherently  ... 
doi:10.1109/sose.2018.00011 dblp:conf/sose/YaryginaB18 fatcat:54wjuoxxhff2tlldyvowt2p2em

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
More specifically, the first part of this deliverable focuses on novel solutions for state-machine replication.  ...  Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques.  ...  by Intel Software Guard Extensions (SGX).  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

Using Context and Interactions to Verify User-Intended Network Requests [article]

He Shuang, Michelle Wong, David Lie
2020 arXiv   pre-print
Second, VInt extracts user-intended inputs from the on-screen user-provided inputs, with the assumption that a human user checks what they entered.  ...  VInt is based on "seeing what the user sees" (context). VInt screenshots the user interface as the user interacts with a security-sensitive form. There are two main components.  ...  For instance, Trusted Execution Environments (TEE), such as Intel SGX [13] and Arm TrustZone [14] , for user-level malware.  ... 
arXiv:2007.15805v1 fatcat:lut7czqbzrd5nelak2pk62uztu
« Previous Showing results 1 — 15 out of 42 results