Securing microservices and microservice architectures: A systematic map** study

A Hannousse, S Yahiouche - Computer Science Review, 2021 - Elsevier
Microservice architectures (MSA) are becoming trending alternatives to existing software
development paradigms notably for develo** complex and distributed applications …

Overcoming security challenges in microservice architectures

T Yarygina, AH Bagge - 2018 IEEE Symposium on Service …, 2018 - ieeexplore.ieee.org
The microservice architectural style is an emerging trend in software engineering that allows
building highly scalable and flexible systems. However, current state of the art provides only …

The return of coppersmith's attack: Practical factorization of widely used RSA moduli

M Nemec, M Sys, P Svenda, D Klinec… - Proceedings of the 2017 …, 2017 - dl.acm.org
We report on our discovery of an algorithmic flaw in the construction of primes for RSA key
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …

Secret Key Recovery in a {Global-Scale}{End-to-End} Encryption System

G Connell, V Fang, R Schmidt, E Dauterman… - … USENIX Symposium on …, 2024 - usenix.org
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While this provides strong privacy, it creates a …

2.5 D root of trust: Secure system-level integration of untrusted chiplets

M Nabeel, M Ashraf, S Patnaik… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
For the first time, we leverage the 2.5 D interposer technology to establish system-level
security in the face of hardware-and software-centric adversaries. More specifically, we …

{SafetyPin}: Encrypted backups with {Human-Memorable} secrets

E Dauterman, H Corrigan-Gibbs… - 14th USENIX Symposium …, 2020 - usenix.org
We present the design and implementation of SafetyPin, a system for encrypted mobile-
device backups. Like existing cloud-based mobile-backup systems, including those of Apple …

JCMathLib: wrapper cryptographic library for transparent and certifiable JavaCard applets

V Mavroudis, P Svenda - 2020 IEEE European Symposium on …, 2020 - ieeexplore.ieee.org
The JavaCard multi-application platform is now deployed to over twenty billion smartcards,
used in various applications ranging from banking payments and authentication tokens to …

Scalable and secure virtualization of HSM with ScaleTrust

J Han, I Yun, S Kim, T Kim, S Son… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Hardware security modules (HSMs) have been utilized as a trustworthy foundation for cloud
services. Unfortunately, existing systems using HSMs fail to meet multi-tenant scalability …

Estonian electronic identity card: security flaws in key management

A Parsovs - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Estonian electronic identity card (ID card) is considered to be one of the most successful
deployments of smart card-based national ID card systems in the world. The public-key …

Order-preserving encryption using approximate common divisors

J Dyer, M Dyer, K Djemame - Journal of Information Security and …, 2019 - Elsevier
Order-preservation is a highly desirable property for encrypted databases as it allows range
queries over ciphertexts. Order-preserving encryption (OPE) is used in the encrypted …