In order to prevent rainbow attacks against a stolen password database, most passwords are appended with a unique salt before hashing them as to make the password random and more secure. However, the decreasing cost of hardware has made it feasible to perform brute force attacks by guessing the passwords (even when extended with their salt). Recently Intel has made processors with Intel SGX commercially available. This security technology enables developers to (1) completely isolate code and data running in an SGX enclave from untrusted code running at any privilege layer and (2) prevent data sealed to an enclave from being accessed on any other machine. We propose to add a key to the password (and salt) before they are hashed. By calcula...
Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
International audienceIn modern computer systems, user processes are isolated from each other by the...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Too many cyber-attacks succeed by hacking password databases and stealing users’credentials; hacking...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
This paper addresses the need for secure storage in virtualized services in the cloud. To this purpo...
In response to the growing need for securing user data in the cloud, recent Intel processors have su...
For the past few years, the demand for cloud computing has increased rapidly. Users outsource data p...
Increases in data production and growing demands for more computing power leads to the current trend...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves , can protect application...
Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
International audienceIn modern computer systems, user processes are isolated from each other by the...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Too many cyber-attacks succeed by hacking password databases and stealing users’credentials; hacking...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
This paper addresses the need for secure storage in virtualized services in the cloud. To this purpo...
In response to the growing need for securing user data in the cloud, recent Intel processors have su...
For the past few years, the demand for cloud computing has increased rapidly. Users outsource data p...
Increases in data production and growing demands for more computing power leads to the current trend...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves , can protect application...
Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...