Trusted applications frequently execute in tandem with untrusted applications on personal devices and in cloud environments. Since these co-scheduled applications share hardware resources, the latencies encountered by the untrusted application betray information about whether the trusted applications are accessing shared resources or not. Prior studies have shown that such information leaks can be used by the untrusted application to deci-pher keys or launch covert-channel attacks. Prior work has also proposed techniques to eliminate information leakage in various shared resources. The best known so-lution to eliminate information leakage in the memory system incurs high performance penalties. This work develops a comprehensive approach to ...
Main memories are a key shared resource within modern computing systems. This thesis shows that memo...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
If trusted processes' secrets or privileged system objects such as file handles are leaked to a...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
International audienceOne of the major concerns when moving to Clouds is data confidentiality. Never...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
Today's computing devices keep considerable amounts of sensitive data unencrypted in RAM. When stole...
Main memories are a key shared resource within modern computing systems. This thesis shows that memo...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
If trusted processes' secrets or privileged system objects such as file handles are leaked to a...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
International audienceOne of the major concerns when moving to Clouds is data confidentiality. Never...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
Today's computing devices keep considerable amounts of sensitive data unencrypted in RAM. When stole...
Main memories are a key shared resource within modern computing systems. This thesis shows that memo...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...