Virtualization: Issues, security threats, and solutions

M Pearce, S Zeadally, R Hunt - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …

Control and management of virtual systems

J Fitzgerald, O Barenboim - US Patent 8,949,826, 2015 - Google Patents
Techniques are disclosed for controlling and managing vir tual machines and other such
virtual systems. VM execution approval is based on compliance With policies controlling …

Compliance-based adaptations in managed virtual systems

J Fitzgerald, O Barenboim - US Patent 8,234,640, 2012 - Google Patents
Techniques are disclosed for controlling and managing virtual machines and other such
virtual systems. VM execution approval is based on compliance with policies controlling …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …

{Policy-Sealed} Data: A New Abstraction for Building Trusted Cloud Services

N Santos, R Rodrigues, KP Gummadi… - 21st USENIX Security …, 2012 - usenix.org
Accidental or intentional mismanagement of cloud software by administrators poses a
serious threat to the integrity and confidentiality of customer data hosted by cloud services …

Network security and privacy challenges in smart vehicle-to-grid

N Saxena, S Grijalva, V Chukwuka… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on
user operational energy requirements, such as desired levels of charging and waiting time …

Giggle: A framework for constructing scalable replica location services

A Chervenak, E Deelman, I Foster… - SC'02: Proceedings …, 2002 - ieeexplore.ieee.org
In wide area computing systems, it is often desirable to create remote read-only copies
(replicas) of files. Replication can be used to reduce access latency, improve data locality …

Atrium: Runtime attestation resilient under memory attacks

S Zeitouni, G Dessouky, O Arias… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Remote attestation is an important security service that allows a trusted party (verifier) to
verify the integrity of a software running on a remote and potentially compromised device …