Reusable enclaves for confidential serverless computing

S Zhao, P Xu, G Chen, M Zhang, Y Zhang… - 32nd USENIX security …, 2023 - usenix.org
The recent development of Trusted Execution Environment has brought unprecedented
opportunities for confidential computing within cloud-based systems. Among various popular …

Assessing the impact of interface vulnerabilities in compartmentalized software

H Lefeuvre, VA Bădoiu, Y Chien, F Huici… - arxiv preprint arxiv …, 2022 - arxiv.org
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …

A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats

MH Rahman - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the face of escalating security threats in modern computing systems, there is an urgent
need for comprehensive defense mechanisms that can effectively mitigate invasive …

[PDF][PDF] 隐私保护密文检索技术研究进展

迟佳琳, 冯登国, 张敏, 姜皞昊, 吴阿新, 孙天齐 - 电子与信息学报, 2024 - jeit.ac.cn
密文检索技术旨在提供密态数据查询服务, 提高密文数据的可用性. 但目前大多数机制仍存在
不同程度的额外信息泄露, 容易被攻击者捕获用于恢复明文信息与查询条件 …

Severifast: Minimizing the root of trust for fast startup of sev microvms

B Holmes, J Waterman, D Williams - Proceedings of the 29th ACM …, 2024 - dl.acm.org
Serverless computing platforms rely on fast container initialization to provide low latency and
high throughput for requests. While hardware enforced trusted execution environments …

SoK: Software Compartmentalization

H Lefeuvre, N Dautenhahn, D Chisnall… - arxiv preprint arxiv …, 2024 - arxiv.org
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …

Memory protection keys: Facts, key extension perspectives, and discussions

S Park, S Lee, T Kim - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
Memory Protection Keys (MPK) offers per-thread memory protection with an affordable
overhead, prompting many new studies. With protection key extension, MPK provides more …

Towards (really) safe and fast confidential I/O

H Lefeuvre, D Chisnall, M Kogias, P Olivier - Proceedings of the 19th …, 2023 - dl.acm.org
Confidential cloud computing enables cloud tenants to distrust their service provider.
Achieving confidential computing solutions that provide concrete security guarantees …

{CPC}: Flexible, Secure, and Efficient {CVM} Maintenance with Confidential Procedure Calls

J Chen, Z Mi, Y **a, H Guan, H Chen - 2024 USENIX Annual Technical …, 2024 - usenix.org
Confidential virtual machines (CVMs), while providing strong data privacy for cloud tenants,
pose significant challenges to VM maintenance like live migration and snapshotting …

Isa-grid: Architecture of fine-grained privilege control for instructions and registers

S Fan, Z Hua, Y **a, H Chen, B Zang - Proceedings of the 50th Annual …, 2023 - dl.acm.org
Isolation is a critical mechanism for enhancing the security of computer systems. By
controlling the access privileges of software and hardware resources, isolation mechanisms …