FlexSEE: a Flexible Secure Execution Environment for protecting data-in-use
Abstract
References
Index Terms
- FlexSEE: a Flexible Secure Execution Environment for protecting data-in-use
Recommendations
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization
ACSAC '21: Proceedings of the 37th Annual Computer Security Applications ConferenceAMD’s Secure Encrypted Virtualization (SEV) is an emerging technology of AMD server processors, which provides transparent memory encryption and key management for virtual machines (VM) without trusting the underlying hypervisor. Like Intel Software ...
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityAMD's Secure Encrypted Virtualization (SEV) is an emerging security feature of modern AMD processors that allows virtual machines to run with encrypted memory and perform confidential computing even with an untrusted hypervisor. This paper first ...
RSA Signatures Under Hardware Restrictions
ASHES '18: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware SecurityWe would like to compute RSA signatures with the help of a Hardware Security Module (HSM). But what can we do when we want to use a certain public exponent that the HSM does not allow or support? Surprisingly, this scenario comes up in real-world ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Andrea Bartolini,
- Kristian Rietveld,
- Program Chairs:
- Catherine Schuman,
- Jose Moreira
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Invited-talk
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 109Total Downloads
- Downloads (Last 12 months)58
- Downloads (Last 6 weeks)4
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in