Filters








9,353 Hits in 4.2 sec

A secure coprocessor for database applications

Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan
2013 2013 23rd International Conference on Field programmable Logic and Applications  
This combination, called Cipherbase, leverages efficient division of laborusing a conventional untrusted cloud server to handle mundane database operations while sensitive data is segregated and processed  ...  In this paper, we describe a novel secure FPGA-based query coprocessor and discuss how it can be tightly integrated with a commercial database system such as SQL Server.  ...  Towards this end, using dedicated hardware as a secure co-processing platform is promising in terms of providing security for a fixed set of operations.  ... 
doi:10.1109/fpl.2013.6645524 dblp:conf/fpl/ArasuEKKRV13 fatcat:kbbqj7li6rccna4jcsvvdrktuu

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms [chapter]

Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
2010 Lecture Notes in Computer Science  
untrusted domains on mobile platform.  ...  We propose a set of simple integrity protection rules based upon open mobile operating system environments and respective application behaviors.  ...  For mobile phone platforms, on the other side, the major security objective is to protect system integrity threaten by user installed applications.  ... 
doi:10.1007/978-3-642-17650-0_9 fatcat:xwg3vb6hv5eanj5gnr57e5w6c4

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms [chapter]

Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig
2012 Lecture Notes in Computer Science  
transactions, as well as a high-performance, general-purpose environment for all other (non-security-sensitive or "red") applications.  ...  On the one hand, partitioning can improve the security of the "green" environment and the performance of the "red" environment (as compared with a virtualized solution).  ...  Lockdown only imposes a 3% average overhead for memory and 2-7% overhead for disk operations for untrusted applications.  ... 
doi:10.1007/978-3-642-30921-2_3 fatcat:ir5ku2luunc7zkft3oecx3dvhi

The Safe-Tcl Security Model [chapter]

John K. Ousterhout, Jacob Y. Levy, Brent B. Welch
1998 Lecture Notes in Computer Science  
Safe-Tcl supports applets using multiple security policies within an application. These policies determine what an applet can do, based on the degree to which the applet is trusted.  ...  Safe-Tcl separates security management into well-defined phases that are geared towards the party responsible for each aspect of security.  ...  Object Oriented Systems. Most other security models for executing untrusted code, such as Java [12] [13] and Telescript [11] , are based on object systems.  ... 
doi:10.1007/3-540-68671-1_12 fatcat:gdf3r2ibavhslobiekencusrmu

Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms [chapter]

Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Our solution satisfies identified security goals of integrity measurement and attestation. We have implemented our solution on a LiMo compatible mobile phone platform.  ...  Our customized secure boot mechanism ensures that a platform can boot to a secure state.  ...  the operating system (OS).  ... 
doi:10.1007/978-3-642-04434-2_7 fatcat:lxv7543fobes7o4pjmxwzu4scy

Architectures for secure portable executable content

Stefanos Gritzalis, George Aggelis, Diomidis Spinellis
1999 Internet Research  
Java enables the execution of a program, on almost any modern computer regardless of hardware configuration and operating system.  ...  The Java programming language supports the concept of downloadable executable content; a key technology in a wide range of emerging applications including collaborative systems, electronic commerce, and  ...  Ultimately, a choice between the two languages will depend more on the application domain and the respective inherent features of each language and less on its approach towards security.  ... 
doi:10.1108/10662249910251273 fatcat:3526qdymzbesvgwlknvjnlcpxy

Tainting is not pointless

Michael Dalton, Hari Kannan, Christos Kozyrakis
2010 ACM SIGOPS Operating Systems Review  
We clarify that many of the arguments against pointer tainting apply only to its use as a malware and virus analysis platform, but do not apply to the application of pointer tainting to memory corruption  ...  We present a rebuttal that addresses the confusion due to the two uses of pointer tainting in security literature.  ...  Acknowledgments This work was supported by Stanford Graduate Fellowships funded by Sequoia Capital and Cisco Systems, an Intel PhD Fellowship, and NSF award CCF-0701607.  ... 
doi:10.1145/1773912.1773933 fatcat:lzicb33szffyrjmmtukpyrqgyq

Let the Cloud Watch Over Your IoT File Systems [article]

Liwei Guo, Yiying Zhang, Felix Xiaozhu Lin
2019 arXiv   pre-print
On a suite of three real-world applications, Overwatch shows moderate security overheads.  ...  weak on security measures.  ...  storage operations that the untrusted edge file system suggests to execute.  ... 
arXiv:1902.06327v1 fatcat:vizclrgz3jfxtb7i7wmp4jcgsi

Mobile Network Threat Analysis and MNO Positioning [chapter]

George Lyberopoulos, Helen Theodoropoulou, Konstantinos Filis
2013 Lecture Notes in Electrical Engineering  
) and applications (M2M, NFC) on the other, have changed the mobile threats landscape and will change the way security will be dealt in the coming years.  ...  Mobile Network Operators (MNOs) have started to investigate the possibility to introduce additional measures to secure their networks, providing thus a defense before security threats materialize.  ...  Acknowledgements: The current study is part of the Project NEMESYS (Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem) which has received funding from the European  ... 
doi:10.1007/978-3-319-01604-7_41 fatcat:glyga4g5lfedjjadzylf7ac4qa

D4.3 - Interoperability of ITEEs in the context of eHealth systems

RISE Research Institutes Of Sweden AB, University Of Westminster
2020 Zenodo  
This deliverable contains a framework of components and enablers to facilitate the development of applications that are portable across ITEEs from different vendors and effectively address the security  ...  needs specific to the context of eHealth systems.  ...  Once booted, the operating system or an application executing on the operating system can initiate a measured launch sequence by invoking the GETSEC( SENTER) instruction, which triggers the loading of  ... 
doi:10.5281/zenodo.4022371 fatcat:3jzz7scyqbfszokkbte4lc7mlu

COREnect EuCNC workshop - Patrick Pipe

AUSTRALO
2021 Zenodo  
"upgraded" to required trust level by o Open source RISC-V cores o MPSoC fabric architecture o Operating System Framework MPSoC fabric architecture Operating System Framework Leading Edge  ...  o Formally verified o Certified o Custom extensions o Integrate accelerators o Support MPSoC and OS o Enhance security Operating System Framework o Modular, µ-kernel based system o  ... 
doi:10.5281/zenodo.4982666 fatcat:mda3vix3qfgznepfob7sgn3i54

The Supervisionary proof-checking kernel (or: a work-in-progress towards proof generating code) [article]

Dominic P. Mulligan, Nick Spinale
2022 arXiv   pre-print
Untrusted processes interact with the system by issuing kernel system calls across a hardware privilege boundary. In this way, the operating system kernel supervises user-space processes.  ...  We describe work on the Supervisionary proof-checking kernel, and briefly sketch its unique system interface. We then describe some potential uses of the Supervisionary kernel.  ...  This record could be used in forming security or correctness challenges, for example by forcing untrusted code to prove that writes to a socket only ever happen after a read, or reads and writes on sockets  ... 
arXiv:2205.03332v1 fatcat:ztkoqzpz2rhjzptdygfyckcz4y

Integrating Encrypted Cloud Database Services using Query Processing

Jadhav Sonali, B. M.
2016 International Journal of Computer Applications  
For that reason in this work proposed a new novel architecture SecureDBaaS which provides confidentiality and as well as allows concurrent execution of operations on encrypted data with distributed policy  ...  In today's environment the various vital information should need to be stored in more secured manner.  ...  SUNDR uses cryptography to provide privacy and integrity in a file system on top of an untrusted file server.  ... 
doi:10.5120/ijca2016911323 fatcat:3oy525qtg5gjbk5uihxlabgwri

ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud [article]

Spyridon Mastorakis, Tahrina Ahmed, Jayaprakash Pisharath
2018 arXiv   pre-print
However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud.  ...  ., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers' systems to compromise execution integrity, posing a threat to the confidentiality of internal enterprise and  ...  SGX has also been used to secure content-based routing mechanisms [39] and Database Management Systems (DBMS) [6] operating on the cloud.  ... 
arXiv:1802.06970v1 fatcat:tvbkle2mpfe2bdtohfm3l4gbce

Distributed Synchronized and Free Access to Encoded Cloud Databases

S. Palani, Y.Prathiba Y.Prathiba, R.Shobha R.Shobha
2015 International Journal of Computer Applications  
We propose a novel construction modeling that incorporates cloud database administrations with the information classifiedness and the likely hood of executing simultaneous operations on twisted evidence  ...  The Setting basic information in the hands of a cloud supplier ought to accompany the surety of security and accessibility for evidence exact stagnant, now association, also organism recycled.  ...  Secure DBaaS depends on standard confirmation and approval systems master vided by the first DBMS server.  ... 
doi:10.5120/21668-4747 fatcat:xplnwjf7kbhpfb7q7bpqdsbiiu
« Previous Showing results 1 — 15 out of 9,353 results