Security issues in cloud environments: a survey
DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …
integration of cloud environments in the industry, which has been consequently motivating …
A guideline on pseudorandom number generation (PRNG) in the IoT
Random numbers are an essential input to many functions on the Internet of Things (IoT).
Common use cases of randomness range from low-level packet transmission to advanced …
Common use cases of randomness range from low-level packet transmission to advanced …
[PDF][PDF] Mining your Ps and Qs: Detection of widespread weak keys in network devices
RSA and DSA can fail catastrophically when used with malfunctioning random number
generators, but the extent to which these problems arise in practice has never been …
generators, but the extent to which these problems arise in practice has never been …
Iago attacks: Why the system call API is a bad untrusted RPC interface
In recent years, researchers have proposed systems for running trusted code on an
untrusted operating system. Protection mechanisms deployed by such systems keep a …
untrusted operating system. Protection mechanisms deployed by such systems keep a …
StealthDB: a scalable encrypted database with full SQL query support
D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
Building enclave-native storage engines for practical encrypted databases
Data confidentiality is one of the biggest concerns that hinders enterprise customers from
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices
Randomness is a vital resource for modern-day information processing, especially for
cryptography. A wide range of applications critically rely on abundant, high-quality random …
cryptography. A wide range of applications critically rely on abundant, high-quality random …
Honey encryption: Security beyond the brute-force bound
We introduce honey encryption (HE), a simple, general approach to encrypting messages
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …
Careful with composition: Limitations of the indifferentiability framework
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …
Why your encrypted database is not secure
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …
management systems (DBMS's), use abstract threat models that capture neither realistic …