Achieving Keyless {CDNs} with Conclaves

S Herwig, C Garman, D Levin - 29th USENIX Security Symposium …, 2020 - usenix.org
Content Delivery Networks (CDNs) serve a large and increasing portion of today's web
content. Beyond caching, CDNs provide their customers with a variety of services, including …

T-lease: A trusted lease primitive for distributed systems

B Trach, R Faqeh, O Oleksenko, W Ozga… - Proceedings Of The …, 2020 - dl.acm.org
A lease is an important primitive for building distributed protocols, and it is ubiquitously
employed in distributed systems. However, the scope of the classic lease abstraction is …

Securing time in untrusted operating systems with timeseal

FM Anwar, L Garcia, X Han… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …

Trusted Timing Services with Timeguard

A Nasrullah, FM Anwar - 2024 IEEE 30th Real-Time and …, 2024 - ieeexplore.ieee.org
The importance of timing services in edge systems makes them a lucrative target for
privileged adversaries. Mali-cious agents with Operating System (OS) privileges can …

Triad: Trusted Timestamps in Untrusted Environments

G Fernandez, A Brito, C Fetzer - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We aim to provide trusted time measurement mechanisms to applications and cloud
infrastructure deployed in environments that could harbor potential adversaries, including …

[PDF][PDF] SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques.

I Loutfi - ICISSP, 2019 - scitepress.org
Human computer interaction is a fundamental part of the modern computing experience.
Everyday, millions of users rely on keyboards as their primary input interface, and use them …

[图书][B] Quality of Time: A New Perspective in Designing Cyber-Physical Systems

FM Anwar - 2019 - search.proquest.com
Abstract Unprecedented Cyber-Physical Systems (CPS) and Internet of Things (IoT)
applications such as health care, connected vehicles, and augmented/virtual reality are …

[PDF][PDF] Systems Support for Trusted Execution Environments

B Trach - 2022 - core.ac.uk
Cloud computing has become a default choice for data processing by both large
corporations and individuals due to its economy of scale and ease of system management …

Execution Environments for Running Legacy Applications in Multi-Party Trust Settings

S Herwig - 2021 - search.proquest.com
Applications often assume that the same party owns all of the application's resources, and
that these resources require the same level of privacy. This assumption no longer holds …

[PDF][PDF] Protecting Applications Using Trusted Execution Environments

C Priebe - 2020 - core.ac.uk
While cloud computing has been broadly adopted, companies that deal with sensitive data
are still reluctant to do so due to privacy concerns or legal restrictions. Vulnerabilities in …