rkt-io: a direct I/O stack for shielded execution
暂无分享,去创建一个
Peter R. Pietzuch | Pramod Bhatotia | Jörg Thalheim | Christian Priebe | Harshavardhan Unnibhavi | Pramod Bhatotia | Christian Priebe | P. Pietzuch | Jörg Thalheim | Harshavardhan Unnibhavi
[1] Brent Byunghoon Kang,et al. Hacking in Darkness: Return-oriented Programming against Secure Enclaves , 2017, USENIX Security Symposium.
[2] Thomas E. Anderson,et al. TAS: TCP Acceleration as an OS Service , 2019, EuroSys.
[3] Heqing Zhu. Data Plane Development Kit (DPDK) , 2020 .
[4] Christof Fetzer,et al. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution , 2019, FAST.
[5] Mark Silberstein,et al. Eleos: ExitLess OS Services for SGX Enclaves , 2017, EuroSys.
[6] Michio Honda,et al. PASTE: A Network Programming Interface for Non-Volatile Main Memory , 2018, NSDI.
[7] Christof Fetzer,et al. ShieldBox: Secure Middleboxes using Shielded Execution , 2018, SOSR.
[8] Rüdiger Kapitza,et al. AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves , 2016, ESORICS.
[9] Srdjan Capkun,et al. Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.
[10] Ion Stoica,et al. Opaque: An Oblivious and Encrypted Distributed Analytics Platform , 2017, NSDI.
[11] Hovav Shacham,et al. Iago attacks: why the system call API is a bad untrusted RPC interface , 2013, ASPLOS '13.
[12] Mark Handley,et al. Disk|Crypt|Net: rethinking the stack for high-performance video streaming , 2017, SIGCOMM.
[13] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[14] Rodrigo Rodrigues,et al. Enhancing the OS against Security Threats in System Administration , 2012, Middleware.
[15] Shweta Shinde,et al. Panoply: Low-TCB Linux Applications With SGX Enclaves , 2017, NDSS.
[16] Emin Gün Sirer,et al. Teechain: a secure payment network with asynchronous blockchain access , 2017, SOSP.
[17] Adam Langley,et al. ChaCha20 and Poly1305 for IETF Protocols , 2018, RFC.
[18] Donald E. Porter,et al. Rethinking the library OS from the top down , 2011, ASPLOS XVI.
[19] Mark Handley,et al. Network stack specialization for performance , 2013, HotNets.
[20] Christof Fetzer,et al. T-Lease: a trusted lease primitive for distributed systems , 2020, SoCC.
[21] Christof Fetzer,et al. SGXBOUNDS: Memory Safety for Shielded Execution , 2017, EuroSys.
[22] Dawn Song,et al. Keystone: an open framework for architecting trusted execution environments , 2020, EuroSys.
[23] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[24] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[25] Michael Stumm,et al. FlexSC: Flexible System Call Scheduling with Exception-Less System Calls , 2010, OSDI.
[26] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[27] Christoforos E. Kozyrakis,et al. ReFlex: Remote Flash ≈ Local Flash , 2017, ASPLOS.
[28] Shujie Cui,et al. SGX-LKL: Securing the Host OS Interface for Trusted Execution , 2019, ArXiv.
[29] Donald E. Porter,et al. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX , 2017, USENIX Annual Technical Conference.
[30] David R. Cheriton,et al. A caching model of operating system kernel functionality , 1994, OSDI '94.
[31] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[32] Dave Levin,et al. Achieving Keyless CDNs with Conclaves , 2020, USENIX Security Symposium.
[33] Luigi Rizzo. Revisiting Network I/O APIs: The netmap Framework , 2012, ACM Queue.
[34] Kapil Vaswani,et al. EnclaveDB: A Secure Database Using SGX , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[35] Christof Fetzer,et al. Pesos: policy enhanced secure object store , 2018, EuroSys.
[36] Andrew Warfield,et al. Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage , 2017, NSDI.
[37] Christof Fetzer,et al. Intel MPX Explained , 2018, PERV.
[38] Johannes Götzfried,et al. Cache Attacks on Intel SGX , 2017, EUROSEC.
[39] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[40] Dawson R. Engler,et al. Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.
[41] Gu-Yeon Wei,et al. Profiling a warehouse-scale computer , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).
[42] Marcus Peinado,et al. High-Resolution Side Channels for Untrusted Operating Systems , 2017, USENIX Annual Technical Conference.
[43] Jing Liu,et al. I'm Not Dead Yet!: The Role of the Operating System in a Kernel-Bypass Era , 2019, HotOS.
[44] Mauro Conti,et al. The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX , 2018, USENIX Security Symposium.
[45] Michio Honda,et al. StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs , 2016, USENIX Annual Technical Conference.
[46] Eunyoung Jeong,et al. mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems , 2014, NSDI.
[47] Sylvia Ratnasamy,et al. SafeBricks: Shielding Network Functions in the Cloud , 2018, NSDI.
[48] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[49] Christof Fetzer,et al. TensorSCONE: A Secure TensorFlow Framework using Intel SGX , 2019, ArXiv.
[50] Jason A. Donenfeld. WireGuard: Next Generation Kernel Network Tunnel , 2017, NDSS.
[51] Christof Fetzer,et al. Clemmys: towards secure remote execution in FaaS , 2019, SYSTOR.
[52] Christoforos E. Kozyrakis,et al. IX: A Protected Dataplane Operating System for High Throughput and Low Latency , 2014, OSDI.
[53] Kyungtae Kim,et al. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX , 2018, NDSS.
[54] Ao Tang,et al. TCP ≈ RDMA: CPU-efficient Remote Storage Access with i10 , 2020, NSDI.
[55] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[56] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[57] Timothy Roscoe,et al. Arrakis , 2014, OSDI.
[58] Nicolae Tapus,et al. LKL: The Linux kernel library , 2010, 9th RoEduNet IEEE International Conference.
[59] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.