Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Faasm: Lightweight isolation for efficient stateful serverless computing
Serverless computing is an excellent fit for big data processing because it can scale quickly
and cheaply to thousands of parallel functions. Existing serverless platforms isolate …
and cheaply to thousands of parallel functions. Existing serverless platforms isolate …
Formal approaches to secure compilation: A survey of fully abstract compilation and related work
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …
properties of the source programs they take as input in the target programs they produce as …
Computer security
CE Landwehr - International journal of information security, 2001 - Springer
A strong factor in the early development of computers was security–the computations that
motivated their development, such as decrypting intercepted messages, generating gunnery …
motivated their development, such as decrypting intercepted messages, generating gunnery …
Data-oriented programming: On the expressiveness of non-control data attacks
As control-flow hijacking defenses gain adoption, it is important to understand the remaining
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …
{ERIM}: Secure, efficient in-process isolation with protection keys ({{{{{MPK}}}}})
Isolating sensitive state and data can increase the security and robustness of many
applications. Examples include protecting cryptographic keys against exploits like …
applications. Examples include protecting cryptographic keys against exploits like …
Faastlane: Accelerating {Function-as-a-Service} Workflows
In FaaS workflows, a set of functions implement application logic by interacting and
exchanging data among themselves. Contemporary FaaS platforms execute each function …
exchanging data among themselves. Contemporary FaaS platforms execute each function …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Code-pointer integrity
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
Occlum: Secure and efficient multitasking inside a single enclave of intel sgx
Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …
regions called enclaves, whose code and data are protected by the CPU from software and …