A survey and classification of software-defined storage systems

R Macedo, J Paulo, J Pereira, A Bessani - ACM Computing Surveys …, 2020 - dl.acm.org
The exponential growth of digital information is imposing increasing scale and efficiency
demands on modern storage infrastructures. As infrastructure complexity increases, so does …

{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution

M Bailleu, J Thalheim, P Bhatotia, C Fetzer… - … USENIX Conference on …, 2019 - usenix.org
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …

Firmusb: Vetting usb device firmware using domain informed symbolic execution

G Hernandez, F Fowze, D Tian, T Yavuz… - Proceedings of the 2017 …, 2017 - dl.acm.org
The USB protocol has become ubiquitous, supporting devices from high-powered
computing devices to small embedded devices and control systems. USB's greatest feature …

Avocado: A Secure {In-Memory} Distributed Storage System

M Bailleu, D Giantsidi, V Gavrielatos… - 2021 USENIX Annual …, 2021 - usenix.org
We introduce Avocado, a secure in-memory distributed storage system that provides strong
security, fault-tolerance, consistency (linearizability) and performance for untrusted cloud …

Securetf: A secure tensorflow framework

DL Quoc, F Gregor, S Arnautov, R Kunkel… - Proceedings of the 21st …, 2020 - dl.acm.org
Data-driven intelligent applications in modern online services have become ubiquitous.
These applications are usually hosted in the untrusted cloud computing infrastructure. This …

Tensorscone: A secure tensorflow framework using intel sgx

R Kunkel, DL Quoc, F Gregor, S Arnautov… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning has become a critical component of modern data-driven online services.
Typically, the training phase of machine learning techniques requires to process large-scale …

Pesos policy enhanced secure object store

R Krahn, B Trach, A Vahldiek-Oberwagner… - Proceedings of the …, 2018 - dl.acm.org
Third-party storage services pose the risk of integrity and confidentiality violations as the
current storage policy enforcement mechanisms are spread across many layers in the …

Hardlog: Practical tamper-proof system auditing using a novel audit device

A Ahmad, S Lee, M Peinado - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Audit systems maintain detailed logs of security-related events on enterprise machines to
forensically analyze potential incidents. In principle, these logs should be safely stored in a …

Hammurabi: A framework for pluggable, logic-based X. 509 certificate validation policies

J Larisch, W Aqeel, M Lum, Y Goldschlag… - Proceedings of the …, 2022 - dl.acm.org
This paper proposes using a logic programming language to disentangle X. 509 certificate
validation policy from mechanism. Expressing validation policies in a logic programming …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …