Faasm: Lightweight isolation for efficient stateful serverless computing

S Shillaker, P Pietzuch - … Annual Technical Conference (USENIX ATC 20 …, 2020 - usenix.org
Serverless computing is an excellent fit for big data processing because it can scale quickly
and cheaply to thousands of parallel functions. Existing serverless platforms isolate …

Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

Computer security

CE Landwehr - International journal of information security, 2001 - Springer
A strong factor in the early development of computers was security–the computations that
motivated their development, such as decrypting intercepted messages, generating gunnery …

Data-oriented programming: On the expressiveness of non-control data attacks

H Hu, S Shinde, S Adrian, ZL Chua… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
As control-flow hijacking defenses gain adoption, it is important to understand the remaining
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …

{ERIM}: Secure, efficient in-process isolation with protection keys ({{{{{MPK}}}}})

A Vahldiek-Oberwagner, E Elnikety… - 28th USENIX Security …, 2019 - usenix.org
Isolating sensitive state and data can increase the security and robustness of many
applications. Examples include protecting cryptographic keys against exploits like …

Faastlane: Accelerating {Function-as-a-Service} Workflows

S Kotni, A Nayak, V Ganapathy, A Basu - 2021 USENIX Annual …, 2021 - usenix.org
In FaaS workflows, a set of functions implement application logic by interacting and
exchanging data among themselves. Contemporary FaaS platforms execute each function …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …

Sok: Eternal war in memory

L Szekeres, M Payer, T Wei… - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …

Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

Occlum: Secure and efficient multitasking inside a single enclave of intel sgx

Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …