Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

Minimal kernel: an operating system architecture for {TEE} to resist board level physical attacks

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - … International Symposium on …, 2019 - usenix.org
ARM specifications recommend that software residing in TEE's (Trusted Execution
Environment) secure world should be located in the on-chip memory to prevent board level …

Mitigating data leakage by protecting memory-resident sensitive data

T Palit, F Monrose, M Polychronakis - Proceedings of the 35th Annual …, 2019 - dl.acm.org
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …

Truth in web mining: Measuring the profitability and the imposed overheads of cryptojacking

P Papadopoulos, P Ilia, E Markatos - … Conference, ISC 2019, New York City …, 2019 - Springer
In recent years, we have been observing a new paradigm of attacks, the so-called
cryptojacking attacks. Given the lower-risk/lower-effort nature of cryptojacking, the number of …

SoftME: A Software‐Based Memory Protection Approach for TEE System to Resist Physical Attacks

M Zhang, Q Zhang, S Zhao, Z Shi… - Security and …, 2019 - Wiley Online Library
The development of the Internet of Things has made embedded devices widely used.
Embedded devices are often used to process sensitive data, making them the target of …

[PDF][PDF] Comparative study of anti-cheat methods in video games

S Lehtonen - University of Helsinki, Faculty of Science, 2020 - helda.helsinki.fi
Cheating has been a problem in multiplayer online video games since they were introduced.
To provide a good game experience, game developers had to develop systems to detect …

EDGELESS Project: On the Road to Serverless Edge AI

C Cicconetti, E Carlini, A Paradell - Proceedings of the 3rd Workshop on …, 2023 - dl.acm.org
The EDGELESS project is set to efficiently operate serverless computing in extremely
diverse computing environments, from resource-constrained edge devices to highly …

Protecting mobile devices from physical memory attacks with targeted encryption

L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia… - Proceedings of the 12th …, 2019 - dl.acm.org
Sensitive data in a process could be scattered over the memory of a computer system for a
prolonged period of time. Unfortunately, DRAM chips were proven insecure in previous …

FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption

F Franzen, M Andreas, M Huber - … of the Tenth ACM Conference on Data …, 2020 - dl.acm.org
To secure mobile devices, such as laptops and smartphones, against unauthorized physical
data access, employing Full Disk Encryption (FDE) is a popular defense. This technique is …

Mitigating data-only attacks by protecting memory-resident sensitive data

T Palit, F Monrose, M Polychronakis - Digital Threats: Research and …, 2020 - dl.acm.org
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …