Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

{PatchVerif}: Discovering Faulty Patches in Robotic Vehicles

H Kim, MO Ozmen, ZB Celik, A Bianchi… - 32nd USENIX Security …, 2023 - usenix.org
Modern software is continuously patched to fix bugs and security vulnerabilities. Patching is
particularly important in robotic vehicles (RVs), in which safety and security bugs can cause …

Runtime software patching: Taxonomy, survey and future directions

C Islam, V Prokhorenko, MA Babar - Journal of Systems and Software, 2023 - Elsevier
Runtime software patching aims to minimize or eliminate service downtime, user
interruptions and potential data losses while deploying a patch. Due to modern software …

Hot Fixing Software: A Comprehensive Review of Terminology, Techniques, and Applications

C Hanna, D Clark, F Sarro, J Petke - arXiv preprint arXiv:2401.09275, 2024 - arxiv.org
A hot fix is an improvement to a specific time-critical issue deployed to a software system in
production. While hot fixing is an essential and common activity in software maintenance, it …

Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices

K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …

Hot Patching Hot Fixes: Reflection and Perspectives

C Hanna, J Petke - … 38th IEEE/ACM International Conference on …, 2023 - ieeexplore.ieee.org
With our reliance on software continuously increasing, it is of utmost importance that it be
reliable. However, complete prevention of bugs in live systems is unfortunately an …

Smile: Secure memory introspection for live enclave

L Zhou, X Ding, F Zhang - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …

A practical approach for updating an integrity-enforced operating system

W Ozga, DL Quoc, C Fetzer - Proceedings of the 21st International …, 2020 - dl.acm.org
Trusted computing defines how to securely measure, store, and verify the integrity of
software controlling a computer. One of the major challenge that make them hard to be …

FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor

Z Ye, L Zhou, F Zhang, W Jin, Z Ning, Y Hu… - Proceedings of the 33rd …, 2024 - dl.acm.org
Linux-based hypervisors in the cloud server suffer from an increasing number of
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …

TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB

T Takemura, R Yamamoto, K Suzaki - IEEE Access, 2024 - ieeexplore.ieee.org
AI&IoT edge devices run complex applications and are under the threat of stealthy attacks
that are not easily detected by traditional security systems. Provenance auditing is a …