Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

[PDF][PDF] Evolution of malware threats and techniques: A review

MN Alenezi, H Alabdulrazzaq… - International journal …, 2020 - researchgate.net
The rapid development of technology, and its usage, in our everyday lives caused us to
depend on many of the aspects it offers. The evolution of the Internet in recent decades has …

[PDF][PDF] Intel SGX explained

V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Sanctum: Minimal hardware extensions for strong software isolation

V Costan, I Lebedev, S Devadas - 25th USENIX Security Symposium …, 2016 - usenix.org
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Regaining lost cycles with HotCalls: A fast interface for SGX secure enclaves

O Weisse, V Bertacco, T Austin - ACM SIGARCH Computer Architecture …, 2017 - dl.acm.org
Intel's SGX secure execution technology allows running computations on secret data using
untrusted servers. While recent work showed how to port applications and large-scale …

Hypersentry: enabling stealthy in-context measurement of hypervisor integrity

AM Azab, P Ning, Z Wang, X Jiang, X Zhang… - Proceedings of the 17th …, 2010 - dl.acm.org
This paper presents HyperSentry, a novel framework to enable integrity measurement of a
running hypervisor (or any other highest privileged software layer on a system). Unlike …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

A formal foundation for secure remote execution of enclaves

P Subramanyan, R Sinha, I Lebedev… - Proceedings of the …, 2017 - dl.acm.org
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …

Backdooring convolutional neural networks via targeted weight perturbations

J Dumford, W Scheirer - 2020 IEEE International Joint …, 2020 - ieeexplore.ieee.org
We present a new white-box backdoor attack that exploits a vulnerability of convolutional
neural networks (CNNs). In particular, we examine the application of facial recognition …