Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

[PDF][PDF] Cryptographic algorithms: A review of the literature, weaknesses and open challenges

Y Salami, V Khajevand, E Zeinali - J. Comput. Robot, 2023 - journals.iau.ir
Abstract Information security has become an important issue in the modern world due to its
increasing popularity in Internet commerce and communication technologies such as the …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

[HTML][HTML] DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system

ST Alvi, MN Uddin, L Islam, S Ahamed - Journal of King Saud University …, 2022 - Elsevier
Voting is a fundamental democratic activity. Many experts believe that paper balloting is the
only appropriate method to ensure everyone's right to vote. But this method is prone to errors …

Scalable memory protection in the {PENGLAI} enclave

E Feng, X Lu, D Du, B Yang, X Jiang, Y **a… - … on Operating Systems …, 2021 - usenix.org
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …

A memory encryption engine suitable for general purpose processors

S Gueron - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Cryptographic protection of memory is an essential ingredient for any technology that allows
a closed computing system to run software in a trustworthy manner and handle secrets …

VAULT: Reducing paging overheads in SGX with efficient integrity verification structures

M Taassori, A Shafiee… - Proceedings of the Twenty …, 2018 - dl.acm.org
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …

Ghostrider: A hardware-software system for memory trace oblivious computation

C Liu, A Harris, M Maas, M Hicks, M Tiwari… - ACM SIGPLAN …, 2015 - dl.acm.org
This paper presents a new, co-designed compiler and architecture called GhostRider for
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …

Exploiting unprotected {I/O} operations in {AMD's} secure encrypted virtualization

M Li, Y Zhang, Z Lin, Y Solihin - 28th USENIX Security Symposium …, 2019 - usenix.org
AMD's Secure Encrypted Virtualization (SEV) is an emerging technology to secure virtual
machines (VM) even in the presence of malicious hypervisors. However, the lack of trust in …

Phantom: Practical oblivious computation in a secure processor

M Maas, E Love, E Stefanov, M Tiwari, E Shi… - Proceedings of the …, 2013 - dl.acm.org
We introduce PHANTOM [1] a new secure processor that obfuscates its memory access
trace. To an adversary who can observe the processor's output pins, all memory access …