Filters








4 Hits in 3.4 sec

Efficient Virtualization-Based Application Protection Against Untrusted Operating System

Yueqiang Cheng, Xuhua Ding, Robert H. Deng
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
Commodity monolithic operating systems are abundant with vulnerabilities that lead to rootkit attacks.  ...  Existing application protection schemes have various drawbacks, such as high performance overhead, large Trusted Computing Base (TCB), or hardware modification.  ...  SecureSwitch [30] system that is quite similar to Lockdown also leverages a BIOS-assisted mechanism for secure instantiation and management of trusted execution environments.  ... 
doi:10.1145/2714576.2714618 dblp:conf/ccs/ChengDD15 fatcat:mhcm3yzhx5asrhfpzipraguznm

TrustLogin

Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
In this paper, we present a framework, TrustLogin, to secure password-based logins on commodity operating systems.  ...  TrustLogin leverages System Management Mode to protect the login credentials from malware even when OS is compromised.  ...  CNS 1421747 and II-NEW 1205453, Defense Advanced Research Projects Agency Contract FA8650-11-C-7190 , and ONR Grant N00014-13-1-0088.  ... 
doi:10.1145/2714576.2714614 dblp:conf/ccs/ZhangLWS15 fatcat:gs7bnebwybfrzbvobxrmjmqsfa

HyperCheck: A Hardware-AssistedIntegrity Monitor

Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou
2014 IEEE Transactions on Dependable and Secure Computing  
Furthermore, security researchers embraced virtual machine monitors (VMMs) as a new mechanism to guarantee deep isolation of untrusted software components, which, coupled with their popularity, promoted  ...  We have implement two prototypes based on our framework design: HyperCheck-I and HyperCheck-II, that vary in their security assumptions and OS code dependence.  ...  This work was partly supported by the US National Science Foundation under Grants CT 0915291 and CNS 1205453 and United States Air Force Research Laboratory (AFRL) through Contract FA8650-10-C-7024.  ... 
doi:10.1109/tdsc.2013.53 fatcat:rivc65uwdrbtbgysrlpl32r654

OpenSGX: An Open Platform for SGX Research

Prerit Jain, Soham Desai, Seongmin Kim, Ming-Wei Shih, JaeHyuk Lee, Changho Choi, Youjung Shin, Taesoo Kim, Brent Byunghoon Kang, Dongsu Han
2016 Proceedings 2016 Network and Distributed System Security Symposium   unpublished
Hardware technologies for trusted computing, or trusted execution environments (TEEs), have rapidly matured over the last decade.  ...  Second, to show OpenSGX's use cases, we applied OpenSGX to protect sensitive information (e.g., directory) of Tor nodes and evaluated their potential performance impacts.  ...  We thanks Patrick Bridges for implementing enclave library and remote attestation supports, Ron Rivest for insightful discussion, Jethro Beekman for checking hardware conformance with OpenSGX, and the  ... 
doi:10.14722/ndss.2016.23011 fatcat:3lifc6ye7fggtk7qalokyzh57i