Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

SGX-aware container orchestration for heterogeneous clusters

S Vaucher, R Pires, P Felber, M Pasin… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Containers are becoming the de facto standard to package and deploy applications and
micro-services in the cloud. Several cloud providers (eg, Amazon, Google, Microsoft) begin …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Establishing trusted i/o paths for sgx client systems with aurora

H Liang, M Li, Y Chen, L Jiang, Z **e… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Today users' private data in edge computing devices (desktops, laptops, and tablets, etc.) is
at high risk because they run applications on potentially compromised or malicious systems …

Retrofitting LBR Profiling to Enhance Virtual Machine Introspection

W Liu, X Liu, Z Li, B Liu, R Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud attack provenance is a well-established industrial practice for assuring transparency
and accountability for a service provider to tenants. However, the multi-tenancy and self …

KShot: Live kernel patching with SMM and SGX

L Zhou, F Zhang, J Liao, Z Ning, J **ao… - 2020 50th Annual …, 2020 - ieeexplore.ieee.org
Live kernel patching is an increasingly common trend in operating system distributions,
enabling dynamic updates to include new features or to fix vulnerabilities without having to …

Bring the missing jigsaw back: Trustedclock for SGX enclaves

H Liang, M Li - Proceedings of the 11th European Workshop on …, 2018 - dl.acm.org
Intel SGX provisions shielded executions for security-sensitive computation, but has to rely
on untrusted system services, such as clock, network and filesystem. This makes enclaves …

Hardware-assisted Live Kernel Function Updating on Intel Platforms

L Zhou, F Zhang, K Leach, X Ding… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Traditional kernel updates such as perfective maintenance and vulnerability patching
requires shutting the system down, disrupting continuous execution of applications …

Aurora: Providing trusted system services for enclaves on an untrusted system

H Liang, M Li, Q Zhang, Y Yu, L Jiang… - arxiv preprint arxiv …, 2018 - arxiv.org
Intel SGX provisions shielded executions for security-sensitive computation, but lacks
support for trusted system services (TSS), such as clock, network and filesystem. This …