An efficient and secure scheme of verifiable computation for intel SGX

W Ding, W Sun, Z Yan, RH Deng… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Cloud computing offers resource-constrained users big-volume data storage and energy-
consuming complicated computation. However, owing to the lack of full trust in the cloud, the …

CoVFeFE: Collusion-Resilient verifiable computing framework for Resource-Constrained devices at network edge

J Wang, A Mtibaa - 2024 IEEE 13th International Conference on …, 2024 - ieeexplore.ieee.org
With the rapid growth of Internet of Vehicles (IoV) applications and the advancement of edge
computing, resource-limited vehicles (and other IoT devices) increasingly rely on external …

Rushmore: securely displaying static and animated images using TrustZone

CM Park, D Kim, DV Sidhwani, A Fuchs… - Proceedings of the 19th …, 2021 - dl.acm.org
We present Rushmore, a system that securely displays static or animated images using
TrustZone. The core functionality of Rushmore is to securely decrypt and display encrypted …

SERENE: A Collusion Resilient Replication-based Verification Framework

A Esmaeili, A Mtibaa - arXiv preprint arXiv:2404.11410, 2024 - arxiv.org
The rapid advancement of autonomous driving technology is accompanied by substantial
challenges, particularly the reliance on remote task execution without ensuring a reliable …

Improving digital forensics and incident analysis in production environments by using virtual machine introspection

B Taubmann - 2020 - opus4.kobv.de
Main memory forensics and its special form, virtual machine introspection (VMI), are
powerful tools for digital forensics and can be used to improve the security of computer …