The majority of cloud providers offers users the possibility to deploy Trusted Execution Environments (TEEs) to protect their data and processes from high privileged adversaries. This offer is intended to address concerns of users when moving critical tasks into the cloud. However, TEEs only allow to attest the integrity of the environment at launch-time. To also enable the attestation of a TEE's integrity at run-time, we present GuaranTEE. GuaranTEE uses control-flow attestation to ensure the integrity of a service running within a TEE. By additionally placing all components of GuaranTEE in TEEs, we are able to not only detect a compromised target, but are also able to protect ourselves from malicious administrators. We show the practicabi...
Abstract—Cloud computing is emerging as an attractive, cost effective computing paradigm. However, m...
While cloud computing has been broadly adopted, companies that deal with sensitive data are still re...
Operational security assurance of a networked system requires providing constant and up-to-date evid...
Cloud technologies have become ubiquitous, being widely used by a variety of users: from individuals...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially w...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Abstract. Many cloud vendors now provide pre-configured OS distributions and network firewall poli-c...
Cloud computing offers the convenience of outsourcing storage and processing power to a public share...
The number of applications and services that are hosted on cloud platforms is constantly increasing....
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques...
Today's cloud computing infrastructures usually require customers who transfer data into the cloud t...
The past two decades have witnessed a transformation of the status and role of comput- ing: from a c...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Cloud computing has become a default choice for data processing by both large corporations and indiv...
Abstract—Cloud computing is emerging as an attractive, cost effective computing paradigm. However, m...
While cloud computing has been broadly adopted, companies that deal with sensitive data are still re...
Operational security assurance of a networked system requires providing constant and up-to-date evid...
Cloud technologies have become ubiquitous, being widely used by a variety of users: from individuals...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially w...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Abstract. Many cloud vendors now provide pre-configured OS distributions and network firewall poli-c...
Cloud computing offers the convenience of outsourcing storage and processing power to a public share...
The number of applications and services that are hosted on cloud platforms is constantly increasing....
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques...
Today's cloud computing infrastructures usually require customers who transfer data into the cloud t...
The past two decades have witnessed a transformation of the status and role of comput- ing: from a c...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Cloud computing has become a default choice for data processing by both large corporations and indiv...
Abstract—Cloud computing is emerging as an attractive, cost effective computing paradigm. However, m...
While cloud computing has been broadly adopted, companies that deal with sensitive data are still re...
Operational security assurance of a networked system requires providing constant and up-to-date evid...