Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Sascha Wessel"'
Autor:
Joana Pecholt, Sascha Wessel
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
CCSW@CCS
With the widespread use of Docker and Kubernetes, OS-level virtualization has become a key technology to deploy and run software. At the same time, data centers and cloud providers offer shared computing resources on demand. The use of these resource
Publikováno v:
Computers & Security. 86:420-436
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive main memory on modern devices against memory attacks, such as via coldboot, DMA, or JTAG. This goal is of special significance when it comes to protec
Autor:
Julian Schütte, Manuel Huber, Sascha Wessel, Gerd Stefan Brost, Mykolai Protsenko, Michael Weiß
Publikováno v:
CPSS@AsiaCCS
The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the dat
Publikováno v:
EuroSec@EuroSys
AMD SEV is a hardware feature designed for the secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but also from a possibly malicious hypervisor. This relieves
Publikováno v:
TrustCom/BigDataSE/ICESS
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. In this paper, we present TransCrypt, a concept for transparent and guest-agnostic, dynamic kernel and user main memory encryption using a custom minim
Publikováno v:
ACSAC
Keys for symmetric cryptography are usually stored in RAM and therefore susceptible to various attacks, ranging from simple buffer overflows to leaks via cold boot, DMA or side channels. A common approach to mitigate such attacks is to move the keys
Publikováno v:
EURASIP Journal on Information Security. 2016
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is th
Publikováno v:
Information Security and Cryptology ISBN: 9783319388977
Inscrypt
Inscrypt
In this paper, we present a novel secure architecture for OS-level virtualization on mobile devices. OS-level virtualization allows to simultaneously operate multiple userland OS instances on one physical device. Compared to previous approaches, our
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3febf5760b9c34bcf38670a30f23bd4
https://doi.org/10.1007/978-3-319-38898-4_25
https://doi.org/10.1007/978-3-319-38898-4_25
Publikováno v:
ARES
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is th