메뉴 건너뛰기




Volumn 02-06-April-2016, Issue , 2016, Pages 277-290

Sego: Pervasive trusted metadata for efficiently verified untrusted system services

Author keywords

Application protection; Crash consistency; Paraverification; Virtualization based security

Indexed keywords

COMPUTATIONAL LINGUISTICS; FILE ORGANIZATION;

EID: 84975270356     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2872362.2872372     Document Type: Conference Paper
Times cited : (16)

References (39)
  • 1
    • 84975279496 scopus 로고    scopus 로고
    • DokuWiki
    • DokuWiki. https://www.dokuwiki.org/.
  • 2
    • 84975311831 scopus 로고    scopus 로고
    • HPC Graph Analysis
    • HPC Graph Analysis. http://www.graphanalysis.org/benchmark/.
  • 3
    • 84975287677 scopus 로고    scopus 로고
    • Intel Trusted Execution Technology
    • Intel Trusted Execution Technology. http://www.intel.com/technology/security/.
  • 4
    • 84975288813 scopus 로고    scopus 로고
    • OpenLDAP
    • OpenLDAP. http://www.openldap.org/.
  • 5
    • 84975323065 scopus 로고    scopus 로고
    • Intel SHA Extensions
    • Intel SHA Extensions, 2013. https://software.intel.com/en-us/articles/intel-sha-extensions.
    • (2013)
  • 6
    • 84975268681 scopus 로고    scopus 로고
    • AES-GCM Encryption Performance on Intel Xeon E5 v3 Processors
    • AES-GCM Encryption Performance on Intel Xeon E5 v3 Processors, 2015. https://software.intel.com/en-us/articles/aes-gcm-encryption-performance-onintel-xeon-e5-v3-processors.
    • (2015)
  • 7
    • 84975267924 scopus 로고    scopus 로고
    • AES-NI SSL performance
    • AES-NI SSL performance, 2015. https://calomel.org/aesni-ssl-performance.html.
    • (2015)
  • 8
    • 84975268668 scopus 로고    scopus 로고
    • FlashArray//m Technical Specs
    • FlashArray//m Technical Specs, 2015. http://www.purestorage.com/products/technical-specifications/.
    • (2015)
  • 9
    • 84975267927 scopus 로고    scopus 로고
    • Samsung V-NAND SSD
    • Samsung V-NAND SSD, 2015. http://www.samsung.com/global/business/semiconductor/minisite/SSD/global/html/ssd850pro/specifications.html.
    • (2015)
  • 11
    • 84952038346 scopus 로고    scopus 로고
    • Shielding applications from an untrusted cloud with haven
    • Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding applications from an untrusted cloud with haven. In OSDI, 2014.
    • (2014) OSDI
    • Baumann, A.1    Peinado, M.2    Hunt, G.3
  • 12
    • 84875649201 scopus 로고    scopus 로고
    • Iago attacks: Why the system call API is a bad untrusted RPC interface
    • March
    • Stephen Checkoway and Hovav Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In ASPLOS, March 2013.
    • (2013) ASPLOS
    • Checkoway, S.1    Shacham, H.2
  • 13
    • 0030259934 scopus 로고    scopus 로고
    • The rio file cache: Surviving operating system crashes
    • Peter M. Chen, Wee Teck Ng, Subhachandra Chandra, Christopher Aycock, and David Rajamani, Gurushankarand Lowell. The rio file cache: Surviving operating system crashes. In ASPLOS, pages 74-83, 1996.
    • (1996) ASPLOS , pp. 74-83
    • Chen, P.M.1    Teck Ng, W.2    Chandra, S.3    Aycock, C.4    Rajamani, D.5    Lowell, G.6
  • 15
    • 0036041421 scopus 로고    scopus 로고
    • An empirical study of operating systems errors
    • Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, and Dawson Engler. An empirical study of operating systems errors. In SOSP, pages 73-88, 2001.
    • (2001) SOSP , pp. 73-88
    • Chou, A.1    Yang, J.2    Chelf, B.3    Hallem, S.4    Engler, D.5
  • 17
    • 84897782769 scopus 로고    scopus 로고
    • Virtual ghost: Protecting applications from hostile operating systems
    • John Criswell, Nathan Dautenhahn, and Vikram Adve. Virtual Ghost: Protecting Applications from Hostile Operating Systems. In ASPLOS, 2014.
    • (2014) ASPLOS
    • Criswell, J.1    Dautenhahn, N.2    Adve, V.3
  • 21
    • 70350475773 scopus 로고    scopus 로고
    • Problem solving with systemtap
    • Frank Ch. Eigler. Problem solving with systemtap. In The Ottawa Linux Symposium, pages 261-268, 2006.
    • (2006) The Ottawa Linux Symposium , pp. 261-268
    • Eigler, F.Ch.1
  • 22
    • 84990231617 scopus 로고    scopus 로고
    • Social networking with frientegrity: Privacy and integrity with an untrusted provider
    • Ariel J Feldman, Aaron Blankstein, Michael J Freedman, and Edward W Felten. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Feldman, A.J.1    Blankstein, A.2    Freedman, M.J.3    Felten, E.W.4
  • 23
    • 84875683130 scopus 로고    scopus 로고
    • InkTag: Secure applications on an untrusted operating system
    • Owen S. Hofmann, Sangman Kim, Alan M. Dunn, Michael Z. Lee, and Emmett Witchel. InkTag: Secure Applications on an Untrusted Operating System. In ASPLOS, 2013.
    • (2013) ASPLOS
    • Hofmann, O.S.1    Kim, S.2    Dunn, A.M.3    Lee, M.Z.4    Witchel, E.5
  • 24
  • 28
    • 33846483949 scopus 로고    scopus 로고
    • Intel virtualization technology: Hardware support for efficient processor virtualization
    • Gil Neiger, Amy Santoni, Felix Leung, Dion Rodgers, and Rich Uhlig. Intel virtualization technology: Hardware support for efficient processor virtualization. In Intel Technology Journal, volume 10, 2006.
    • (2006) Intel Technology Journal , vol.10
    • Neiger, G.1    Santoni, A.2    Leung, F.3    Rodgers, D.4    Uhlig, R.5
  • 30
    • 84969670036 scopus 로고    scopus 로고
    • Appsec: A safe execution environment for security sensitive applications
    • Jianbao Ren, Yong Qi, Yuehua Dai, Xiaoguang Wang, and Yi Shi. Appsec: A safe execution environment for security sensitive applications. In VEE, 2015.
    • (2015) VEE
    • Ren, J.1    Qi, Y.2    Dai, Y.3    Wang, X.4    Shi, Y.5
  • 31
    • 0026812659 scopus 로고
    • The design and implementation of a log-structured file system
    • February
    • Mendel Rosenblum and John K. Ousterhout. The design and implementation of a log-structured file system. ACM Trans. Comput. Syst., 10 (1), February 1992.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.1
    • Rosenblum, M.1    Ousterhout, J.K.2
  • 32
    • 84897768729 scopus 로고    scopus 로고
    • Using ARM trustzone to build a trusted language runtime for mobile applications
    • Nuno Santos, Himanshu Raj, Stefan Saroiu, and Alec Wolman. Using ARM trustzone to build a trusted language runtime for mobile applications. In ASPLOS, 2014.
    • (2014) ASPLOS
    • Santos, N.1    Raj, H.2    Saroiu, S.3    Wolman, A.4
  • 34
    • 21644451622 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In SOSP, pages 207-222, 2003.
    • (2003) SOSP , pp. 207-222
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 35
    • 85007468031 scopus 로고    scopus 로고
    • Secpod: A framework for virtualization-based security systems
    • Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, and Yajin Zhou. Secpod: a framework for virtualization-based security systems. In USENIX ATC, 2015.
    • (2015) USENIX ATC
    • Wang, X.1    Chen, Y.2    Wang, Z.3    Qi, Y.4    Zhou, Y.5
  • 36
    • 84975222309 scopus 로고    scopus 로고
    • Controlled-channel attacks: Deterministic side channels for untrusted operating systems
    • Yuanzhong Xu, Weidong Cui, and Marcus Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE S&P, 2015.
    • (2015) IEEE S&P
    • Xu, Y.1    Cui, W.2    Peinado, M.3
  • 37
    • 77952404303 scopus 로고    scopus 로고
    • Using hypervisor to provide data secrecy for user applications on a per-page basis
    • Jisoo Yang and Kang G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, pages 71-80, 2008.
    • (2008) VEE , pp. 71-80
    • Yang, J.1    Shin, K.G.2
  • 38
    • 84938813376 scopus 로고    scopus 로고
    • Is linux kernel oops useful or not
    • Takeshi Yoshimura, Hiroshi Yamada, and Kenji Kono. Is linux kernel oops useful or not. In HotDep, 2012.
    • (2012) HotDep
    • Yoshimura, T.1    Yamada, H.2    Kono, K.3
  • 39
    • 84975306914 scopus 로고    scopus 로고
    • Hacking team leak shows how secretive zero-day exploit sales work
    • Kim Zetter. Hacking team leak shows how secretive zero-day exploit sales work. Wired, 2015.
    • (2015) Wired
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.