Filters








544 Hits in 7.3 sec

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token [chapter]

Ian Goldberg, Graeme Jenkinson, Frank Stajano
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user's credentials.  ...  Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use.  ...  Acknowledgements We thank Rob Harle for his advice on selecting a Bluetooth Low Energy development platform.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-39555-5_3">doi:10.1007/978-3-319-39555-5_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/artibzcroffs7gmlxg4hfnld5i">fatcat:artibzcroffs7gmlxg4hfnld5i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160615144525/http://www.cl.cam.ac.uk:80/~fms27/papers/2016-GoldbergJenSta-cold.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/23/fe23a904484e4d116f46d8fc4c2836d766c70030.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-39555-5_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
<span title="2019-08-14">2019</span> <i title="Apress"> Demystifying Internet of Things Security </i> &nbsp;
Having cold or warm sites with hardware security modules (HSM) that are unlocked with smartcards or other hardware tokens is best practice.  ...  , commands, or workloads. 448 • Mitigation: Device identity and mutual authentication for all communications flows from the OT/IT center are vital to prevent these attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-2896-8_6">doi:10.1007/978-1-4842-2896-8_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eznovqjwwbbn5a4czv3q5cj3cm">fatcat:eznovqjwwbbn5a4czv3q5cj3cm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200326151203/https://link.springer.com/content/pdf/10.1007%2F978-1-4842-2896-8_6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/3b/ab3beb8f844777fb5baa8091a5466a446306ba22.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-2896-8_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

FPGAs for trusted cloud computing

Ken Eguro, Ramarathnam Venkatesan
<span title="">2012</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/plojvu5mhreuxnue5ey7fivkbi" style="color: black;">22nd International Conference on Field Programmable Logic and Applications (FPL)</a> </i> &nbsp;
and an untrusted system administrator.  ...  However, in this paper we describe how protected bitstreams can also be used to create a root of trust for the clients of cloud computing services.  ...  This protection cannot withstand attacks such as cold boot, violating assumption c in our attack model. The work in [4] implements a full system, including a processor and a TPM inside an FPGA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fpl.2012.6339242">doi:10.1109/fpl.2012.6339242</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/fpl/EguroV12.html">dblp:conf/fpl/EguroV12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ulmfw4csqzgo7oe46xzmuou4cy">fatcat:ulmfw4csqzgo7oe46xzmuou4cy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150922021925/http://research.microsoft.com/pubs/170502/fplTWCEguroCameraReady.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2e/cb/2ecb4959a515905fbc1cdec6baf8fb02097c5dd2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fpl.2012.6339242"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices [article]

Yang Su, Yansong Gao, Michael Chesser, Omid Kavehei, Alanson Sample, Damith C.Ranasinghe
<span title="2019-08-17">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation  ...  Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermittent powering, limited computational capabilities, and the absence  ...  This is because the CRFID device has no supervisory control of an operating system and is designed in the manner of a low-end and low-cost device.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.10463v3">arXiv:1807.10463v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/moig5tynmbecvo63ihhpkedjca">fatcat:moig5tynmbecvo63ihhpkedjca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930114213/https://arxiv.org/pdf/1807.10463v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/e3/b9e3e91df717f7c2f4decc5a0b1d67ec3ac0d5b3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.10463v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones

Emmanouel T. Michailidis, Demosthenes Vouyioukas
<span title="2022-02-08">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ycpqunwwuja6beynxtnfswzqgy" style="color: black;">Drones</a> </i> &nbsp;
In this paper, up-to-date research studies on authentication mechanisms for IoD networks are presented.  ...  Recently, the development of authentication mechanisms for the IoD has received unprecedented attention.  ...  Nevertheless, TPMs may be vulnerable to cold boot attacks, as long as the attacker has physical access to the devices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/drones6020041">doi:10.3390/drones6020041</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ye34o3pjjjhovbe7ob3ch4mswa">fatcat:ye34o3pjjjhovbe7ob3ch4mswa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220519120628/https://mdpi-res.com/d_attachment/drones/drones-06-00041/article_deploy/drones-06-00041-v2.pdf?version=1644835778" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/36/bf365f575134c6e344a74742c852ee89ad3f6f9f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/drones6020041"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Serverless Computing: A Security Perspective [article]

Eduard Marin, Diego Perino, Roberto Di Pietro
<span title="2022-01-27">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
However, in this quest for efficiency, security is not ranked among the top priorities, also because of the (misleading) belief that current solutions developed for virtualised environments could be applied  ...  The implied cost reduction, coupled with a simplified management of underlying applications, are expected to further push the adoption of virtualisation-based solutions, including cloud-computing or telco-cloud  ...  Acknowledgements We would like to thank the anonymous reviewers for their comments, that helped us to improve the quality of the manuscript.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.03832v2">arXiv:2107.03832v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbidlkkpk5cclbxciy2mrgpepq">fatcat:kbidlkkpk5cclbxciy2mrgpepq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220130081532/https://arxiv.org/pdf/2107.03832v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/1b/eb1b7f28634b9726a05f8489e6da0483f3958462.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.03832v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The Android Platform Security Model [article]

René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich
<span title="2020-12-14">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints.  ...  While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously  ...  contributions to the Authentication section.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.05572v2">arXiv:1904.05572v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mivqkc76j5bq7ltojhtwtekdpq">fatcat:mivqkc76j5bq7ltojhtwtekdpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201218085510/https://arxiv.org/pdf/1904.05572v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/21/d82100ee407c1edb4de0d8f1c6601e980b2a9ffb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.05572v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

An Improved Recovery Algorithm for Decayed AES Key Schedule Images [chapter]

Alex Tsow
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Halderman et al. [1] established this recovery capability, dubbed the cold-boot attack, as a serious vulnerability for several widespread software-based encryption packages.  ...  The algorithm guesses bytes in an order such that guess n implies values for n schedule bytes for n < 11 in the 128-bit version; guesses 11-14 imply an additional 10 bytes each and the last guess implies  ...  Boettcher for their strident advocacy-without which this paper would not be possible.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-05445-7_14">doi:10.1007/978-3-642-05445-7_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kl3y6ai7gvgpxcairxn25s2kze">fatcat:kl3y6ai7gvgpxcairxn25s2kze</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728130517/https://link.springer.com/content/pdf/10.1007%2F978-3-642-05445-7_14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/d3/6dd3315dc9abbc56cbf20286ffa19dc81db65df3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-05445-7_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Issues and Future Challenges of Cloud Service Authentication

<span title="2017-05-03">2017</span> <i title="Obuda University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uwcqb6ghifgnlk73meee4juzsy" style="color: black;">Acta Polytechnica Hungarica</a> </i> &nbsp;
Many efforts, within in the literature, have surveyed cloud security and privacy, but lack a detailed analysis of authentication for the cloud.  ...  In view of the research gap and the importance of a valid authentication infrastructure, this survey critically investigates different authentication strategies and frameworks proposed for cloud services  ...  strategies Low deployment cost if TPM is integral part of an enterprise system Could be extended to incorporate other security services Inherent TPM weaknesses such as cold-boot attack and master password  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12700/aph.14.2.2017.2.4">doi:10.12700/aph.14.2.2017.2.4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dxef6qn5ebcandjzkdbp4dilwy">fatcat:dxef6qn5ebcandjzkdbp4dilwy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603015658/http://uni-obuda.hu/journal/Lim_MatKiah_Ang_73.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/34/5c34539d135962478c4864fd6e2fd74a59622a7a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12700/aph.14.2.2017.2.4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Using innovative instructions to create trustworthy software solutions

Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan Del Cuvillo
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2kokby3zfzen3bd62o6cskolxq" style="color: black;">Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP &#39;13</a> </i> &nbsp;
In a more advanced attack, if an attacker has physical possession of a platform, he may be able to use memory snooping or cold boot style attacks [6] to acquire the keying material for a valid ERM solution  ...  This would continue to allow for low-cost input devices while still maintaining control of confidential information processing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2487726.2488370">doi:10.1145/2487726.2488370</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/isca/HoekstraLPPC13.html">dblp:conf/isca/HoekstraLPPC13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jbfsmq5c4feczbfmbjkdacvvnq">fatcat:jbfsmq5c4feczbfmbjkdacvvnq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150302011830/https://software.intel.com/sites/default/files/article/413938/hasp-2013-innovative-instructions-for-trusted-solutions.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/2c/452c803f91ab670bf36403ed5412875b13ae9e94.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2487726.2488370"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Evaluation of Security Solutions for Android Systems [article]

Asaf Shabtai, Dudu Mimran, Yuval Elovici
<span title="2015-02-17">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Many of the security solutions fail to cope with advanced attacks and are not aways properly designed for smartphone platforms.  ...  Therefore, there is a need for a methodology to evaluate their effectiveness.  ...  When an attacker has physical access to the device they can use the cold boot attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.04870v1">arXiv:1502.04870v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uubl4boopjaapnxbfvfqnbnoe4">fatcat:uubl4boopjaapnxbfvfqnbnoe4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200825013004/https://arxiv.org/ftp/arxiv/papers/1502/1502.04870.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/80/5580ef407cdfae40e814e453f10b3cfe6904f8d2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.04870v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Peripheral state persistence for transiently-powered systems

Gautier Berthou, Tristan Delizy, Kevin Marquet, Tanguy Risset, Guillaume Salagnac
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kmzorgotfvghfli4uvrxut5bhm" style="color: black;">2017 Global Internet of Things Summit (GIoTS)</a> </i> &nbsp;
of our prototype). programmer keys, might mitigate the time-window in which an attacker can use compromised keys while also not significantly changing the overall model.  ...  At boot, Mementos searches for an active checkpoint (details below), then copies its contents into RAM.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/giots.2017.8016243">doi:10.1109/giots.2017.8016243</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/giots/BerthouDMRS17.html">dblp:conf/giots/BerthouDMRS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r2vbvtjlnvdlxkkt6ldrw43l6m">fatcat:r2vbvtjlnvdlxkkt6ldrw43l6m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200304060150/https://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1767&amp;context=open_access_dissertations" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/59/07594ba3451fead83a4490b38afbe78d13d9a9c7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/giots.2017.8016243"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Scalable security for petascale parallel file systems

Andrew W. Leung, Ethan L. Miller, Stephanie Jones
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zigbcra6rjdivda6lkzknwuo5q" style="color: black;">Proceedings of the 2007 ACM/IEEE conference on Supercomputing - SC &#39;07</a> </i> &nbsp;
Experiments on the Maat prototype in the Ceph petascale file system show an overhead as little as 6-7%.  ...  Extended capabilities limit the number of capabilities needed by allowing a capability to authorize I/O for any number of client-file pairs.  ...  Finally, we thank our shepherd Paul Stodghill and the anonymous reviewers for their insightful feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1362622.1362644">doi:10.1145/1362622.1362644</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sc/LeungMJ07.html">dblp:conf/sc/LeungMJ07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7jtbpcemhbhbbf3emiopmnc66m">fatcat:7jtbpcemhbhbbf3emiopmnc66m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160430003858/http://www.ssrc.ucsc.edu/Papers/leung-sc07.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/53/75538227a5e39372f9f8141b7612f5e2ec130cf6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1362622.1362644"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

TrustLite

Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m52bwee6j5hgxdqcfnxtfxy5we" style="color: black;">Proceedings of the Ninth European Conference on Computer Systems - EuroSys &#39;14</a> </i> &nbsp;
As such devices are increasingly subject to attacks, new hardware protection mechanisms are needed to provide the required resilience and dependency at low cost.  ...  Our FPGA prototype shows that these capabilities are achievable even on low-cost embedded systems.  ...  or fault injection out of scope for economically motivated attackers and that mitigations are in place against side-channel leakage through power, electromagnetic emissions or timing behavior [15, 26  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2592798.2592824">doi:10.1145/2592798.2592824</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurosys/KoeberlSSV14.html">dblp:conf/eurosys/KoeberlSSV14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zd6hn6tnfzad7etlhi4omtjsua">fatcat:zd6hn6tnfzad7etlhi4omtjsua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809133002/https://www.trust.cased.de/fileadmin/user_upload/Group_TRUST/PubsPDF/trustlite.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/5d/5d5d7d98ec914789a3aa455558624c8cb279d5fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2592798.2592824"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

D1.1 - State of the Art Analysis

Danilo Ardagna
<span title="2021-06-30">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
In the last part of the deliverable, we report an overview of the performance modelling solutions, security, and privacy problems for AI applications in edge environments.  ...  The deliverable starts with an overview of AI applications and edge computing market trends.  ...  Based on this, it summarises existing and potential mitigation approaches against training attacks, that is, mitigations to protect the ML model from poisoning and backdoor attacks, and against inference  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.6372377">doi:10.5281/zenodo.6372377</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f6ldfuwivbcltew4smiiwphfty">fatcat:f6ldfuwivbcltew4smiiwphfty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220324081612/https://zenodo.org/record/6372378/files/D1.1%20-%20State%20of%20the%20art%20analysis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/20/40/2040bd995a83b8a1e0489b0c760316d929314eb2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.6372377"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 544 results