Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reusable enclaves for confidential serverless computing
The recent development of Trusted Execution Environment has brought unprecedented
opportunities for confidential computing within cloud-based systems. Among various popular …
opportunities for confidential computing within cloud-based systems. Among various popular …
Assessing the impact of interface vulnerabilities in compartmentalized software
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …
only what they need. When compartmentalizing existing software, many approaches neglect …
A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats
MH Rahman - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the face of escalating security threats in modern computing systems, there is an urgent
need for comprehensive defense mechanisms that can effectively mitigate invasive …
need for comprehensive defense mechanisms that can effectively mitigate invasive …
[PDF][PDF] 隐私保护密文检索技术研究进展
迟佳琳, 冯登国, 张敏, 姜皞昊, 吴阿新, 孙天齐 - 电子与信息学报, 2024 - jeit.ac.cn
密文检索技术旨在提供密态数据查询服务, 提高密文数据的可用性. 但目前大多数机制仍存在
不同程度的额外信息泄露, 容易被攻击者捕获用于恢复明文信息与查询条件 …
不同程度的额外信息泄露, 容易被攻击者捕获用于恢复明文信息与查询条件 …
Severifast: Minimizing the root of trust for fast startup of sev microvms
B Holmes, J Waterman, D Williams - Proceedings of the 29th ACM …, 2024 - dl.acm.org
Serverless computing platforms rely on fast container initialization to provide low latency and
high throughput for requests. While hardware enforced trusted execution environments …
high throughput for requests. While hardware enforced trusted execution environments …
SoK: Software Compartmentalization
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
Memory protection keys: Facts, key extension perspectives, and discussions
Memory Protection Keys (MPK) offers per-thread memory protection with an affordable
overhead, prompting many new studies. With protection key extension, MPK provides more …
overhead, prompting many new studies. With protection key extension, MPK provides more …
Towards (really) safe and fast confidential I/O
Confidential cloud computing enables cloud tenants to distrust their service provider.
Achieving confidential computing solutions that provide concrete security guarantees …
Achieving confidential computing solutions that provide concrete security guarantees …
{CPC}: Flexible, Secure, and Efficient {CVM} Maintenance with Confidential Procedure Calls
Confidential virtual machines (CVMs), while providing strong data privacy for cloud tenants,
pose significant challenges to VM maintenance like live migration and snapshotting …
pose significant challenges to VM maintenance like live migration and snapshotting …
Isa-grid: Architecture of fine-grained privilege control for instructions and registers
Isolation is a critical mechanism for enhancing the security of computer systems. By
controlling the access privileges of software and hardware resources, isolation mechanisms …
controlling the access privileges of software and hardware resources, isolation mechanisms …