B Trach, R Faqeh, O Oleksenko, W Ozga… - Proceedings Of The …, 2020 - dl.acm.org
A lease is an important primitive for building distributed protocols, and it is ubiquitously employed in distributed systems. However, the scope of the classic lease abstraction is …
FM Anwar, L Garcia, X Han… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
An accurate sense of elapsed time is essential for the safe and correct operation of hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
A Nasrullah, FM Anwar - 2024 IEEE 30th Real-Time and …, 2024 - ieeexplore.ieee.org
The importance of timing services in edge systems makes them a lucrative target for privileged adversaries. Mali-cious agents with Operating System (OS) privileges can …
G Fernandez, A Brito, C Fetzer - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We aim to provide trusted time measurement mechanisms to applications and cloud infrastructure deployed in environments that could harbor potential adversaries, including …
Human computer interaction is a fundamental part of the modern computing experience. Everyday, millions of users rely on keyboards as their primary input interface, and use them …
Abstract Unprecedented Cyber-Physical Systems (CPS) and Internet of Things (IoT) applications such as health care, connected vehicles, and augmented/virtual reality are …
Cloud computing has become a default choice for data processing by both large corporations and individuals due to its economy of scale and ease of system management …
Applications often assume that the same party owns all of the application's resources, and that these resources require the same level of privacy. This assumption no longer holds …
While cloud computing has been broadly adopted, companies that deal with sensitive data are still reluctant to do so due to privacy concerns or legal restrictions. Vulnerabilities in …