Virtualization: Issues, security threats, and solutions

M Pearce, S Zeadally, R Hunt - ACM computing surveys (CSUR), 2013‏ - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020‏ - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Towards scaling blockchain systems via sharding

H Dang, TTA Dinh, D Loghin, EC Chang, Q Lin… - Proceedings of the …, 2019‏ - dl.acm.org
Existing blockchain systems scale poorly because of their distributed consensus protocols.
Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016‏ - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Ríos, R Román, J López - Computers & Security, 2023‏ - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

{SCONE}: Secure linux containers with intel {SGX}

S Arnautov, B Trach, F Gregor, T Knauth… - … USENIX Symposium on …, 2016‏ - usenix.org
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a
lower resource footprint, faster startup times, and higher I/O performance compared to virtual …

Controlled-channel attacks: Deterministic side channels for untrusted operating systems

Y Xu, W Cui, M Peinado - 2015 IEEE Symposium on Security …, 2015‏ - ieeexplore.ieee.org
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017‏ - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

Shielding applications from an untrusted cloud with haven

A Baumann, M Peinado, G Hunt - ACM Transactions on Computer …, 2015‏ - dl.acm.org
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015‏ - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …