Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Ozga, Wojciech"'
Publikováno v:
HASP '23: Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, October 2023
Confidential computing is a key technology for isolating high-assurance applications from the large amounts of untrusted code typical in modern systems. Existing confidential computing systems cannot be certified for use in critical applications, lik
Externí odkaz:
http://arxiv.org/abs/2308.10249
Existing attestation mechanisms lack scalability and support for heterogeneous virtual execution environments (VEEs), such as virtual machines and containers executed inside or outside hardware isolation on different vendors' hardware in clouds manag
Externí odkaz:
http://arxiv.org/abs/2304.00382
Autor:
Cheng, Pau-Chen, Ozga, Wojciech, Valdez, Enriquillo, Ahmed, Salman, Gu, Zhongshu, Jamjoom, Hani, Franke, Hubertus, Bottomley, James
Intel Trust Domain Extensions (TDX) is a new architectural extension in the 4th Generation Intel Xeon Scalable Processor that supports confidential computing. TDX allows the deployment of virtual machines in the Secure-Arbitration Mode (SEAM) with en
Externí odkaz:
http://arxiv.org/abs/2303.15540
Autor:
Ozga, Wojciech
We are living in the time of the digital revolution in which the world we know changes beyond recognition every decade. The positive aspect is that these changes also drive the progress in quality and availability of digital assets crucial for our so
Externí odkaz:
https://tud.qucosa.de/id/qucosa%3A80380
https://tud.qucosa.de/api/qucosa%3A80380/attachment/ATT-0/
https://tud.qucosa.de/api/qucosa%3A80380/attachment/ATT-0/
Autor:
Cheng, Pau-Chen1 (AUTHOR) pau@us.ibm.com, Ozga, Wojciech2 (AUTHOR) woz@zurich.ibm.com, Valdez, Enriquillo1 (AUTHOR) rvaldez@us.ibm.com, Ahmed, Salman1 (AUTHOR) sahmed@ibm.com, Gu, Zhongshu1 (AUTHOR) zgu@us.ibm.com, Jamjoom, Hani1 (AUTHOR) jamjoom@us.ibm.com, Franke, Hubertus1 (AUTHOR) frankeh@us.ibm.com, Bottomley, James1 (AUTHOR) jejb@us.ibm.com
Publikováno v:
ACM Computing Surveys. Sep2024, Vol. 56 Issue 9, p1-33. 33p.
Publikováno v:
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
High-assurance security systems require strong isolation from the untrusted world to protect the security-sensitive or privacy-sensitive data they process. Existing regulations impose that such systems must execute in a trustworthy operating system (
Externí odkaz:
http://arxiv.org/abs/2205.06091
Publikováno v:
Proceedings of 2021 IEEE International Conference on Cloud Computing (IEEE CLOUD'21)
Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of VMs in which these services are deployed needs to be ensured even in the presence of powerful adversaries with administrative access
Externí odkaz:
http://arxiv.org/abs/2104.14862
Publikováno v:
The 35th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2021)
Confidential multi-stakeholder machine learning (ML) allows multiple parties to perform collaborative data analytics while not revealing their intellectual property, such as ML source code, model, or datasets. State-of-the-art solutions based on homo
Externí odkaz:
http://arxiv.org/abs/2103.16898
Autor:
Trach, Bohdan, Faqeh, Rasha, Oleksenko, Oleksii, Ozga, Wojciech, Bhatotia, Pramod, Fetzer, Christof
A lease is an important primitive for building distributed protocols, and it is ubiquitously employed in distributed systems. However, the scope of the classic lease abstraction is restricted to the trusted computing infrastructure. Unfortunately, th
Externí odkaz:
http://arxiv.org/abs/2101.06485
Trusted computing defines how to securely measure, store, and verify the integrity of software controlling a computer. One of the major challenges that make them hard to be applied in practice is the issue with software updates. Specifically, an oper
Externí odkaz:
http://arxiv.org/abs/2101.01289