-
1
-
-
34247885571
-
Intel virtualization technology for directed I/O
-
ABRAMSON, D., JACKSON, J., MUTHRASANALLUR, S., NEIGER, G., REGNIER, G., SANKARAN, R., SCHOINAS, I., UHLIG, R., VEMBU, B., and WIEGERT, J. Intel Virtualization Technology for Directed I/O. Intel Technology Journal (2006).
-
(2006)
Intel Technology Journal
-
-
Abramson, D.1
Jackson, J.2
Muthrasanallur, S.3
Neiger, G.4
Regnier, G.5
Sankaran, R.6
Schoinas, I.7
Uhlig, R.8
Vembu, B.9
Wiegert, J.10
-
2
-
-
84897781978
-
Innovative technology for CPU based attestation and sealing
-
ANATI, I., GUERON, S., JOHNSON, S., and SCARLATA, V. Innovative Technology for CPU Based Attestation and Sealing. In HASP (2013).
-
(2013)
HASP
-
-
Anati, I.1
Gueron, S.2
Johnson, S.3
Scarlata, V.4
-
4
-
-
79959972183
-
TrustedDB: A trusted hardware based database with privacy and data confidentiality
-
BAJAJ, S., and SION, R. TrustedDB: A Trusted Hardware Based Database with Privacy and Data Confidentiality. In SIGMOD (2011).
-
(2011)
SIGMOD
-
-
Bajaj, S.1
Sion, R.2
-
5
-
-
84881117836
-
CorrectDB: SQL engine with practical query authentication
-
BAJAJ, S., and SION, R. CorrectDB: SQL Engine with Practical Query Authentication. VLDB (2013).
-
(2013)
VLDB
-
-
Bajaj, S.1
Sion, R.2
-
6
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
BAUMANN, A., PEINADO, M., and HUNT, G. Shielding Applications from an Untrusted Cloud with Haven. In OSDI (2014).
-
(2014)
OSDI
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
7
-
-
84976658204
-
User-level interprocess communication for shared memory multiprocessors
-
May
-
BERSHAD, B. N., and ANDERSON, T. E., LAZOWSKA, E. D., and LEVY, H. M. User-level interprocess communication for shared memory multiprocessors. ACM TOCS 9, 2 (May 1991), 175-198.
-
(1991)
ACM TOCS
, vol.9
, Issue.2
, pp. 175-198
-
-
Bershad, B.N.1
Anderson, T.E.2
Lazowska, E.D.3
Levy, H.M.4
-
8
-
-
84996592953
-
Kubernetes and the path to cloud native
-
BREWER, E. A. Kubernetes and the Path to Cloud Native. In SoCC (2015).
-
(2015)
SoCC
-
-
Brewer, E.A.1
-
9
-
-
38549138136
-
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
-
2006
-
BRICKELL, E., GRAUNKE, G., NEVE, M., and SEIFERT, J.-P. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR Cryptology ePrint Archive 2006 (2006), 52.
-
(2006)
IACR Cryptology EPrint Archive
, pp. 52
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.-P.4
-
11
-
-
18844373581
-
Microsoft palladium: A business overview
-
CARROLL, A., JUAREZ, M., POLK, J., and LEININGER, T. Microsoft Palladium: A Business Overview. Microsoft Content Security Business Unit (2002), 1-9.
-
(2002)
Microsoft Content Security Business Unit
, pp. 1-9
-
-
Carroll, A.1
Juarez, M.2
Polk, J.3
Leininger, T.4
-
12
-
-
84875649201
-
Iago attacks: Why the system call API is a bad untrusted RPC interface
-
CHECKOWAY, S., and SHACHAM, H. Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface. In ASPLOS (2013).
-
(2013)
ASPLOS
-
-
Checkoway, S.1
Shacham, H.2
-
13
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
CHEN, X., GARFINKEL, T., LEWIS, E. C., SUBRAHMANYAM, P., and WALDSPURGER, C. A., BONEH, D., DWOSKIN, J., and PORTS, D. R. Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems. In ASPLOS (2008).
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
14
-
-
77954889082
-
Benchmarking cloud serving systems with YCSB
-
COOPER, B. F., SILBERSTEIN, A., TAM, E., RAMAKRISHNAN, R., and SEARS, R. Benchmarking Cloud Serving Systems with YCSB. In SoCC (2010).
-
(2010)
SoCC
-
-
Cooper, B.F.1
Silberstein, A.2
Tam, E.3
Ramakrishnan, R.4
Sears, R.5
-
15
-
-
84979683582
-
Intel SGX explained
-
COSTAN, V., and DEVADAS, S. Intel SGX explained. Tech. rep., Cryptology ePrint Archive, Report 2016/086, 2016.
-
(2016)
Tech. Rep., Cryptology EPrint Archive, Report 2016/086
-
-
Costan, V.1
Devadas, S.2
-
16
-
-
84897782769
-
Virtual ghost: Protecting applications from hostile operating systems
-
CRISWELL, J., DAUTENHAHN, N., and ADVE, V. Virtual Ghost: Protecting Applications from Hostile Operating Systems. In ASPLOS (2014).
-
(2014)
ASPLOS
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
17
-
-
85080678216
-
-
Dec.
-
CVE-ID: CVE-2014-9357. Available from MITRE at https://cve.mitre.org, Dec. 2014.
-
(2014)
CVE-ID: CVE-2014-9357
-
-
-
18
-
-
85080729884
-
-
May
-
CVE-ID: CVE-2015-3456. Available from MITRE at https://cve.mitre.org, May 2015.
-
(2015)
CVE-ID: CVE-2015-3456
-
-
-
19
-
-
85080660267
-
-
Aug.
-
CVE-ID: CVE-2015-5154. Available from MITRE at https://cve.mitre.org, Aug. 2015.
-
(2015)
CVE-ID: CVE-2015-5154
-
-
-
20
-
-
33847753565
-
The transport layer security (TLS) protocol version 1.2
-
Aug. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685
-
DIERKS, T., and RESCORLA, E. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685.
-
(2008)
RFC 5246 (Proposed Standard)
-
-
Dierks, T.1
Rescorla, E.2
-
21
-
-
84866114929
-
High performance network virtualization with SR-IOV
-
DONG, Y., YANG, X., LI, J., LIAO, G., TIAN, K., and GUAN, H. High performance network virtualization with SR-IOV. Journal of Parallel and Distributed Computing 72, 11 (2012), 1471-1480.
-
(2012)
Journal of Parallel and Distributed Computing
, vol.72
, Issue.11
, pp. 1471-1480
-
-
Dong, Y.1
Yang, X.2
Li, J.3
Liao, G.4
Tian, K.5
Guan, H.6
-
22
-
-
84937435024
-
An updated performance comparison of virtual machines and linux containers
-
FELTER, W., FERREIRA, A., RAJAMONY, R., and RUBIO, J. An updated performance comparison of virtual machines and Linux containers. In ISPASS (2015).
-
(2015)
ISPASS
-
-
Felter, W.1
Ferreira, A.2
Rajamony, R.3
Rubio, J.4
-
23
-
-
55549119760
-
Distributed caching with memcached
-
Aug.
-
FITZPATRICK, B. Distributed caching with memcached. Linux Journal (Aug. 2004).
-
(2004)
Linux Journal
-
-
Fitzpatrick, B.1
-
25
-
-
85080696243
-
-
HAPROXY. http://www.haproxy.org, 2016.
-
(2016)
HAPROXY
-
-
-
26
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
HOEKSTRA, M., LAL, R., PAPPACHAN, P., PHEGADE, V., and DEL CUVILLO, J. Using Innovative Instructions to Create Trustworthy Software Solutions. In HASP (2013).
-
(2013)
HASP
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
27
-
-
84875683130
-
InkTag: Secure applications on an untrusted operating system
-
HOFMANN, O. S., KIM, S., DUNN, A. M., and LEE, M. Z., and WITCHEL, E. InkTag: Secure Applications on an Untrusted Operating System. In ASPLOS (2013).
-
(2013)
ASPLOS
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
28
-
-
85080644587
-
-
INITIATIVE, T. O. C. https://www.opencontainers.org, 2016.
-
(2016)
-
-
-
31
-
-
85080791204
-
-
October
-
INTEL CORP. Product Change Notification 114074-00. https://qdms.intel.com/dm/i.aspx/5A160770-FC47-47A0-BF8A-062540456F0A/PCN114074-00.pdf, October 2015.
-
(2015)
Product Change Notification 114074-00
-
-
-
34
-
-
85080744682
-
-
IOZONE. http://www.iozone.org, 2016.
-
(2016)
IOZONE
-
-
-
35
-
-
85080635844
-
-
KUBERNETES. http://kubernetes.io, 2016.
-
(2016)
KUBERNETES
-
-
-
36
-
-
84975270356
-
Sego: Pervasive trusted metadata for efficiently verified untrusted system services
-
KWON, Y., and DUNN, A. M., LEE, M. Z., HOFMANN, O. S., XU, Y., and WITCHEL, E. Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services. In ASPLOS (2016).
-
(2016)
ASPLOS
-
-
Kwon, Y.1
Dunn, A.M.2
Lee, M.Z.3
Hofmann, O.S.4
Xu, Y.5
Witchel, E.6
-
37
-
-
84940997196
-
MiniBox: A two-way sandbox for x86 native code
-
LI, Y., MCCUNE, J., NEWSOME, J., PERRIG, A., BAKER, B., and DREWRY, W. MiniBox: A Two-Way Sandbox for x86 Native Code. In ATC (2014).
-
(2014)
ATC
-
-
Li, Y.1
Mccune, J.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
38
-
-
85080793158
-
-
LIBC, M. https://www.musl-libc.org, 2016.
-
(2016)
LIBC, M.
-
-
-
39
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
Oct
-
LINDEMANN, M., PEREZ, R., SAILER, R., VAN DOORN, L., and SMITH, S. Building the IBM 4758 Secure Coprocessor. Computer 34, 10 (Oct 2001), 57-66.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Lindemann, M.1
Perez, R.2
Sailer, R.3
Van Doorn, L.4
Smith, S.5
-
40
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
MCCUNE, J. M., LI, Y., QU, N., ZHOU, Z., DATTA, A., GLIGOR, V., and PERRIG, A. TrustVisor: Efficient TCB Reduction and Attestation. In S&P (2010).
-
(2010)
S&P
-
-
Mccune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
41
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
MCCUNE, J. M., and PARNO, B. J., PERRIG, A., REITER, M. K., and ISOZAKI, H. Flicker: An Execution Infrastructure for TCB Minimization. In EuroSys (2008).
-
(2008)
EuroSys
-
-
Mccune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
42
-
-
84926444656
-
Docker: Lightweight linux containers for consistent development and deployment
-
Mar.
-
MERKEL, D. Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal (Mar. 2014).
-
(2014)
Linux Journal
-
-
Merkel, D.1
-
43
-
-
35348942716
-
NGSCB: A trusted open system
-
PEINADO, M., CHEN, Y., ENGLAND, P., and MANFERDELLI, J. NGSCB: A Trusted Open System. In ACISP (2004).
-
(2004)
ACISP
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
44
-
-
85080660609
-
-
PROJECT, A. H. S. https://httpd.apache.org, 2016.
-
(2016)
-
-
-
46
-
-
85080769528
-
-
REDIS. http://redis.io, 2016.
-
(2016)
REDIS
-
-
-
47
-
-
84857955714
-
Nginx: The high-performance web server and reverse proxy
-
Sept.
-
REESE, W. Nginx: the High-Performance Web Server and Reverse Proxy. Linux Journal (Sept. 2008).
-
(2008)
Linux Journal
-
-
Reese, W.1
-
48
-
-
85080766613
-
-
RKT (COREOS). https://coreos.com/rkt, 2016.
-
(2016)
RKT (COREOS)
-
-
-
49
-
-
84897768729
-
Using ARM TrustZone to build a trusted language runtime for mobile applications
-
SANTOS, N., RAJ, H., SAROIU, S., and WOLMAN, A. Using ARM TrustZone to build a trusted language runtime for mobile applications. In ASPLOS (2014).
-
(2014)
ASPLOS
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
50
-
-
84945188553
-
VC3: Trustworthy data analytics in the cloud using SGX
-
SCHUSTER, F., COSTA, M., FOURNET, C., GKANTSIDIS, C., PEINADO, M., MAINAR-RUIZ, G., and RUSSINOVICH, M. VC3: Trustworthy Data Analytics in the Cloud using SGX. In S&P (2015).
-
(2015)
S&P
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
52
-
-
82155174764
-
FlexSC: Flexible system call scheduling with exception-less system calls
-
SOARES, L., and STUMM, M. FlexSC: Flexible System Call Scheduling with Exception-less System Calls. In OSDI (2010).
-
(2010)
OSDI
-
-
Soares, L.1
Stumm, M.2
-
53
-
-
35448941069
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
Mar.
-
SOLTESZ, S., PÖTZL, H., FIUCZYNSKI, M. E., BAVIER, A., AND PETERSON, L. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. SIGOPS OSR (Mar. 2007).
-
(2007)
SIGOPS OSR
-
-
Soltesz, S.1
Pötzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
54
-
-
85080771749
-
-
SQLCIPHER. https://www.zetetic.net/sqlcipher, 2016.
-
(2016)
SQLCIPHER
-
-
-
55
-
-
85080724268
-
-
SQLite. https://www.sqlite.org, 2016.
-
(2016)
SQLite
-
-
-
56
-
-
85080717160
-
-
SWARM, D. https://docs.docker.com/swarm, 2016.
-
(2016)
-
-
Swarm, D.1
-
57
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
TA-MIN, R., LITTY, L., and LIE, D. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In OSDI (2006).
-
(2006)
OSDI
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
58
-
-
84922850962
-
Microservices
-
THONES, J. Microservices. IEEE Software 32, 1 (2015), 116-116.
-
(2015)
IEEE Software
, vol.32
, Issue.1
, pp. 116-116
-
-
Thones, J.1
-
60
-
-
20344391930
-
Intel virtualization technology
-
UHLIG, R., NEIGER, G., RODGERS, D., SANTONI, A. L., MARTINS, F., and ANDERSON, A. V., BENNETT, S. M., KÄGI, A., and LEUNG, F. H., and SMITH, L. Intel virtualization technology. Computer 38, 5 (2005), 48-56.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.5
Anderson, A.V.6
Bennett, S.M.7
Kägi, A.8
Leung, F.H.9
Smith, L.10
-
63
-
-
84945197313
-
Controlled-channel attacks: Deterministic side channels for untrusted operating systems
-
XU, Y., CUI, W., and PEINADO, M. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In S&P (2015).
-
(2015)
S&P
-
-
Xu, Y.1
Cui, W.2
Peinado, M.3
-
64
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
YANG, J., and SHIN, K. G. Using Hypervisor to Provide Data Secrecy for User Applications on a Per-page Basis. In VEE (2008).
-
(2008)
VEE
-
-
Yang, J.1
Shin, K.G.2
-
65
-
-
85054861572
-
NSA hacker chief explains how to keep him out of your system
-
Jan.
-
ZETTER, K. NSA Hacker Chief Explains How to Keep Him Out of Your System. Wired (Jan. 2016).
-
(2016)
Wired
-
-
Zetter, K.1
-
66
-
-
82655179240
-
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
ZHANG, F., CHEN, J., CHEN, H., and ZANG, B. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. In SOSP (2011).
-
(2011)
SOSP
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|