Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Vinod Ganapathy"'
Publikováno v:
2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS).
Publikováno v:
ACM Transactions on Architecture and Code Optimization. 18:1-25
Intel’s SGX architecture offers clients of public cloud computing platforms the ability to create hardware-protected enclaves whose contents are protected from privileged system software. However, SGX relies on system software for enclave memory ma
Publikováno v:
AAAI
Machine learning models are increasingly being deployed in practice. Machine Learning as a Service (MLaaS) providers expose such models to queries by third-party developers through application programming interfaces (APIs). Prior work has developed m
Publikováno v:
AsiaCCS
GPUs are now commonly available in most modern computing platforms. They are increasingly being adopted in cloud platforms and data centers due to their immense computing capability. In response to this growth in usage, manufacturers continuously try
Publikováno v:
ESEC/SIGSOFT FSE
The Intel Security Guard Extensions (SGX) architecture enables the abstraction of enclaved execution, using which an application can protect its code and data from powerful adversaries, including system software that executes with the highest process
Publikováno v:
CCS
We present Privaros, a framework to enforce privacy policies on drones. Privaros is designed for commercial delivery drones, such as the ones that will likely be used by Amazon Prime Air. Such drones visit a number of host airspaces, each of which ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::88da37bc3d0ec8f6497d7a8354371ca0
Publikováno v:
HotMobile
Commercial and end-user drones come equipped with a wide array of sensors. Unregulated use of such drones in public airspaces poses a serious threat to the privacy of citizens. We make the case for restricted spaces for drones, which are geographic a
Publikováno v:
Computers & Security. 62:177-192
Major infrastructure-as-a-cloud (IaaS) providers have recently been building marketplaces of “cloud apps,” which are VMs pre-installed with a variety of software stacks. Clients of cloud computing leverage such markets by downloading and instanti
Publikováno v:
CODASPY
Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. These techniques ei
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited pa