Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Erick Bauman"'
Autor:
Xiaoyu He, Linyu Li, Bingchang Liu, Wei Zou, Aihua Piao, Lei Yu, Erick Bauman, Wei Huo, Feng Li, Kevin W. Hamlen
Publikováno v:
LCTES
TrustScope is a new, a practical approach to identifying vulnerabilities in printer firmware without actually touching the firmware. By exploiting the trust between the firmware and the device drivers, TrustScope analyzes driver software to identify
Publikováno v:
AsiaCCS
Recent advances in trusted execution environments, specifically with Intel's introduction of SGX on consumer processors, have provided unprecedented opportunities to create secure applications with a small TCB. While a large number of SGX solutions h
Publikováno v:
Blockchain
An Ethereum bytecode rewriting and validation architecture is proposed and evaluated for securing smart contracts in decentralized cryptocurrency systems without access to contract source code. This addresses a wave of smart contract vulnerabilities
Publikováno v:
CGO
Intel SGX provides a secure enclave in which code and data are hidden from the outside world, including privileged code such as the OS or hypervisor. However, by default, enclave code prior to initialization can be disassembled and therefore no secre
Publikováno v:
NDSS
Publikováno v:
AsiaCCS
System logs are the greatest forensics assets that capture how an operating system or a program behaves. System logs are often the next immediate attack target once a system is compromised, and it is thus paramount to protect them. This paper introdu
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783319663319
RAID
RAID
To make outsourcing computing more practical, Intel recently introduced SGX, a hardware extension that creates secure enclaves for the execution of client applications. With SGX, instruction execution and data access inside an enclave are invisible t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e5e726148425553166b8d824c9863f9e
https://doi.org/10.1007/978-3-319-66332-6_16
https://doi.org/10.1007/978-3-319-66332-6_16
Autor:
Zhiqiang Lin, Erick Bauman
Publikováno v:
SysTEX@Middleware
The integrity and confidentiality of computer games has long been a concern of game developers, both in preventing players from cheating and from obtaining unlicensed copies of the software. Recently, Intel released SGX, which can provide new securit
Publikováno v:
Information Security Practice and Experience ISBN: 9783319175324
ISPEC
ISPEC
Text-based passwords are probably the most common way to authenticate a user on the Internet today. To implement a password system, it is critical to ensure the confidentiality of the stored password—if an attacker obtains a password, they get full
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78a205de97a081ace72cded0c5fce9c3
https://doi.org/10.1007/978-3-319-17533-1_18
https://doi.org/10.1007/978-3-319-17533-1_18