{fTPM}: A {Software-Only} Implementation of a {TPM} Chip

H Raj, S Saroiu, A Wolman, R Aigner, J Cox… - 25th USENIX Security …, 2016 - usenix.org
Commodity CPU architectures, such as ARM and Intel CPUs, have started to offer trusted
computing features in their CPUs aimed at displacing dedicated trusted hardware …

{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution

M Bailleu, J Thalheim, P Bhatotia, C Fetzer… - … USENIX Conference on …, 2019 - usenix.org
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …

Ariadne: A minimal approach to state continuity

R Strackx, F Piessens - 25th USENIX Security Symposium (USENIX …, 2016 - usenix.org
Protected-module architectures such as Intel SGX provide strong isolation guarantees to
sensitive parts of applications while the system is up and running. Unfortunately systems in …

Bootstrap** and maintaining trust in the cloud

N Schear, PT Cable, TM Moyer, B Richard… - Proceedings of the 32nd …, 2016 - dl.acm.org
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the
provider to secure applications and data. Cloud providers do not offer the ability to create …

{cTPM}: A cloud {TPM} for {Cross-Device} trusted applications

C Chen, H Raj, S Saroiu, A Wolman - 11th USENIX Symposium on …, 2014 - usenix.org
Current Trusted Platform Modules (TPMs) are ill-suited for cross-device scenarios in trusted
mobile applications because they hinder the seamless sharing of data across multiple …

Guardat: Enforcing data policies at the storage layer

A Vahldiek-Oberwagner, E Elnikety, A Mehta… - Proceedings of the …, 2015 - dl.acm.org
In today's data processing systems, both the policies protecting stored data and the
mechanisms for their enforcement are spread over many software components and …

T-lease: A trusted lease primitive for distributed systems

B Trach, R Faqeh, O Oleksenko, W Ozga… - Proceedings Of The …, 2020 - dl.acm.org
A lease is an important primitive for building distributed protocols, and it is ubiquitously
employed in distributed systems. However, the scope of the classic lease abstraction is …

ICE: A passive, high-speed, state-continuity scheme

R Strackx, B Jacobs, F Piessens - … of the 30th Annual Computer Security …, 2014 - dl.acm.org
The amount of trust that can be placed in commodity computing platforms is limited by the
likelihood of vulnerabilities in their huge software stacks. Protected-module architectures …

Securing time in untrusted operating systems with timeseal

FM Anwar, L Garcia, X Han… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …

LogSafe: Secure and scalable data logger for IoT devices

H Nguyen, R Ivanov, LTX Phan… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
As devices in the Internet of Things (IoT) increase in number and integrate with everyday
lives, large amounts of personal information will be generated. With multiple discovered …