Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 3Article No.: 36, Pages 1–42https://doi.org/10.1145/3700418Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the ...
- research-articleNovember 2024
uIO: Lightweight and Extensible Unikernels
SoCC '24: Proceedings of the 2024 ACM Symposium on Cloud ComputingPages 580–599https://doi.org/10.1145/3698038.3698518Unikernels specialize operating systems by tailoring the kernel for a specific application at compile time. While the specialized library OS approach provides a smaller OS image-thus improving the bootup process, performance, migration costs, and ...
- research-articleAugust 2022
Towards isolated execution at the machine level
APSys '22: Proceedings of the 13th ACM SIGOPS Asia-Pacific Workshop on SystemsPages 68–77https://doi.org/10.1145/3546591.3547530Isolated execution with CPU-level protection, such as process sandboxes, virtual machines, and trusted execution environments, has long been studied to mitigate software vulnerabilities. However, the complexity of system software inevitably leads to ...
- research-articleMay 2022
DMAFV: testing device drivers against DMA faults
SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied ComputingPages 1176–1182https://doi.org/10.1145/3477314.3507082A device may produce invalid values due to a malfunction or infection with malicious firmware. On the other hand, many device drivers implicitly assume that devices will conform to specifications and often do not sufficiently check device input values. ...
- posterNovember 2021
POSTER: OS Independent Fuzz Testing of I/O Boundary
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2453–2455https://doi.org/10.1145/3460120.3485359Device drivers tend to be vulnerable to errant/malicious devices because many of them assume that devices always operate correctly. If a device driver is compromised either deliberately or accidentally, this can lead to system failure or give ...