Survey on multi-access edge computing security and privacy
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
SGX-aware container orchestration for heterogeneous clusters
Containers are becoming the de facto standard to package and deploy applications and
micro-services in the cloud. Several cloud providers (eg, Amazon, Google, Microsoft) begin …
micro-services in the cloud. Several cloud providers (eg, Amazon, Google, Microsoft) begin …
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Establishing trusted i/o paths for sgx client systems with aurora
H Liang, M Li, Y Chen, L Jiang, Z **e… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Today users' private data in edge computing devices (desktops, laptops, and tablets, etc.) is
at high risk because they run applications on potentially compromised or malicious systems …
at high risk because they run applications on potentially compromised or malicious systems …
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection
Cloud attack provenance is a well-established industrial practice for assuring transparency
and accountability for a service provider to tenants. However, the multi-tenancy and self …
and accountability for a service provider to tenants. However, the multi-tenancy and self …
KShot: Live kernel patching with SMM and SGX
Live kernel patching is an increasingly common trend in operating system distributions,
enabling dynamic updates to include new features or to fix vulnerabilities without having to …
enabling dynamic updates to include new features or to fix vulnerabilities without having to …
Bring the missing jigsaw back: Trustedclock for SGX enclaves
H Liang, M Li - Proceedings of the 11th European Workshop on …, 2018 - dl.acm.org
Intel SGX provisions shielded executions for security-sensitive computation, but has to rely
on untrusted system services, such as clock, network and filesystem. This makes enclaves …
on untrusted system services, such as clock, network and filesystem. This makes enclaves …
Hardware-assisted Live Kernel Function Updating on Intel Platforms
Traditional kernel updates such as perfective maintenance and vulnerability patching
requires shutting the system down, disrupting continuous execution of applications …
requires shutting the system down, disrupting continuous execution of applications …
Aurora: Providing trusted system services for enclaves on an untrusted system
H Liang, M Li, Q Zhang, Y Yu, L Jiang… - arxiv preprint arxiv …, 2018 - arxiv.org
Intel SGX provisions shielded executions for security-sensitive computation, but lacks
support for trusted system services (TSS), such as clock, network and filesystem. This …
support for trusted system services (TSS), such as clock, network and filesystem. This …