Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Virtualization: Issues, security threats, and solutions
M Pearce, S Zeadally, R Hunt - ACM computing surveys (CSUR), 2013 - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …
system architectures provides a powerful platform for system building, the advantages of …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
Towards scaling blockchain systems via sharding
Existing blockchain systems scale poorly because of their distributed consensus protocols.
Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling …
Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling …
Evolution of attacks, threat models, and solutions for virtualized systems
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
{SCONE}: Secure linux containers with intel {SGX}
S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016 - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …
Controlled-channel attacks: Deterministic side channels for untrusted operating systems
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …
operating systems has inspired a long line of work on excluding these operating systems …
[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
(TEE) that enables secure execution of a program in an isolated environment, an enclave …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …