S-Blocks: Lightweight and Trusted Virtual Security Function with SGX
نویسندگان
چکیده
منابع مشابه
Trusted Code Execution on Untrusted Platforms Using Intel Sgx
Today, isolated trusted computation and code execution is of paramount importance to protect sensitive information and workfl ows from other malicious privileged or unprivileged software. Intel Software Guard Extensions (SGX) is a set of security architecture extensions fi rst introduced in the Skylake microarchitecture that enables a Trusted Execution Environment (TEE). It provides an ‘inverse...
متن کاملHardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments. However, virtualizing TPMs, especially virutalizing the Platform Configuration Registers (PCRs), strikes against one of the...
متن کاملSecurity for the cloud infrastructure: Trusted virtual data center implementation
infrastructure: Trusted virtual data center implementation S. Berger R. Cáceres K. Goldman D. Pendarakis R. Perez J. R. Rao E. Rom R. Sailer W. Schildhauer D. Srinivasan S. Tal E. Valdez The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. In this paper, we extend previous work on the TVDc...
متن کاملLightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analy...
متن کاملLightweight Modeling of Java Virtual Machine Security Constraints using Alloy
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2020
ISSN: 2168-7161,2372-0018
DOI: 10.1109/tcc.2020.2985045