Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
{fTPM}: A {Software-Only} Implementation of a {TPM} Chip
Commodity CPU architectures, such as ARM and Intel CPUs, have started to offer trusted
computing features in their CPUs aimed at displacing dedicated trusted hardware …
computing features in their CPUs aimed at displacing dedicated trusted hardware …
{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …
and integrity properties, but also ensures data freshness to protect against rollback/forking …
Ariadne: A minimal approach to state continuity
Protected-module architectures such as Intel SGX provide strong isolation guarantees to
sensitive parts of applications while the system is up and running. Unfortunately systems in …
sensitive parts of applications while the system is up and running. Unfortunately systems in …
Bootstrap** and maintaining trust in the cloud
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the
provider to secure applications and data. Cloud providers do not offer the ability to create …
provider to secure applications and data. Cloud providers do not offer the ability to create …
{cTPM}: A cloud {TPM} for {Cross-Device} trusted applications
Current Trusted Platform Modules (TPMs) are ill-suited for cross-device scenarios in trusted
mobile applications because they hinder the seamless sharing of data across multiple …
mobile applications because they hinder the seamless sharing of data across multiple …
Guardat: Enforcing data policies at the storage layer
In today's data processing systems, both the policies protecting stored data and the
mechanisms for their enforcement are spread over many software components and …
mechanisms for their enforcement are spread over many software components and …
T-lease: A trusted lease primitive for distributed systems
A lease is an important primitive for building distributed protocols, and it is ubiquitously
employed in distributed systems. However, the scope of the classic lease abstraction is …
employed in distributed systems. However, the scope of the classic lease abstraction is …
ICE: A passive, high-speed, state-continuity scheme
The amount of trust that can be placed in commodity computing platforms is limited by the
likelihood of vulnerabilities in their huge software stacks. Protected-module architectures …
likelihood of vulnerabilities in their huge software stacks. Protected-module architectures …
Securing time in untrusted operating systems with timeseal
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
LogSafe: Secure and scalable data logger for IoT devices
As devices in the Internet of Things (IoT) increase in number and integrate with everyday
lives, large amounts of personal information will be generated. With multiple discovered …
lives, large amounts of personal information will be generated. With multiple discovered …