Iso-UniK: lightweight multi-process unikernel through memory protection keys

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys

Many applications can benefit from isolating sensitive data in a secure library. Examples include protecting cryptographic keys behind a narrow cryptography API to defend against vulnerabilities like OpenSSL’s Heartbleed bug. When such a library is called relatively infrequently, page-based hardware isolation can be used, because the cost of kernel-mediated domain switching is tolerable. Howeve...

متن کامل

Keys to climate protection.

Technology policy lies at the core of the climate change challenge. Even with a cutback in wasteful energy spending, our current technologies cannot support both a decline in carbon dioxide emissions and an expanding global economy. If we try to restrain emissions without a fundamentally new set of technologies, we will end up stifl ing economic growth, including the development prospects for b...

متن کامل

Intrinsically Reliable and Lightweight Physical Obfuscated Keys

Physical Obfuscated Keys (POKs) allow tamper-resistant storage of random keys based on physical disorder. The output bits of current POK designs need to be first corrected due to measurement noise and next de-correlated since the original output bits may not be i.i.d. (independent and identically distributed) and also public helper information for error correction necessarily correlates the cor...

متن کامل

Kguard Lightweight Kernel Protection

Angelos d. Keromytis is an Associate Professor of computer Science at columbia University. His research interests revolve around systems and software security and reliability. He received his Phd in 2001 from the University of Pennsylvania. [email protected] Kernel exploits have become increasingly popular over the past several years. We have developed kGuard, a cross-platform system that...

متن کامل

An intelligent agent-based competitive contract process: UNIK-AGENT

As the second generation of electronic commerce, the framework of the agent based commerce is proposed. Since the communication messages and solution methods of agents are significantly influenced by the contract type, we have defined the grammar of contracts first. By using this generalized contract grammar, we can express new creative contract types as well as traditional ones like bids and a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity

سال: 2020

ISSN: 2523-3246

DOI: 10.1186/s42400-020-00051-9