메뉴 건너뛰기




Volumn , Issue , 2016, Pages 689-703

SCONE: Secure linux containers with Intel SGX

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; LINUX; PROGRAM PROCESSORS; SYSTEMS ANALYSIS;

EID: 85068857453     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (774)

References (66)
  • 2
    • 84897781978 scopus 로고    scopus 로고
    • Innovative technology for CPU based attestation and sealing
    • ANATI, I., GUERON, S., JOHNSON, S., and SCARLATA, V. Innovative Technology for CPU Based Attestation and Sealing. In HASP (2013).
    • (2013) HASP
    • Anati, I.1    Gueron, S.2    Johnson, S.3    Scarlata, V.4
  • 4
    • 79959972183 scopus 로고    scopus 로고
    • TrustedDB: A trusted hardware based database with privacy and data confidentiality
    • BAJAJ, S., and SION, R. TrustedDB: A Trusted Hardware Based Database with Privacy and Data Confidentiality. In SIGMOD (2011).
    • (2011) SIGMOD
    • Bajaj, S.1    Sion, R.2
  • 5
    • 84881117836 scopus 로고    scopus 로고
    • CorrectDB: SQL engine with practical query authentication
    • BAJAJ, S., and SION, R. CorrectDB: SQL Engine with Practical Query Authentication. VLDB (2013).
    • (2013) VLDB
    • Bajaj, S.1    Sion, R.2
  • 6
    • 84952038346 scopus 로고    scopus 로고
    • Shielding applications from an untrusted cloud with haven
    • BAUMANN, A., PEINADO, M., and HUNT, G. Shielding Applications from an Untrusted Cloud with Haven. In OSDI (2014).
    • (2014) OSDI
    • Baumann, A.1    Peinado, M.2    Hunt, G.3
  • 7
    • 84976658204 scopus 로고
    • User-level interprocess communication for shared memory multiprocessors
    • May
    • BERSHAD, B. N., and ANDERSON, T. E., LAZOWSKA, E. D., and LEVY, H. M. User-level interprocess communication for shared memory multiprocessors. ACM TOCS 9, 2 (May 1991), 175-198.
    • (1991) ACM TOCS , vol.9 , Issue.2 , pp. 175-198
    • Bershad, B.N.1    Anderson, T.E.2    Lazowska, E.D.3    Levy, H.M.4
  • 8
    • 84996592953 scopus 로고    scopus 로고
    • Kubernetes and the path to cloud native
    • BREWER, E. A. Kubernetes and the Path to Cloud Native. In SoCC (2015).
    • (2015) SoCC
    • Brewer, E.A.1
  • 9
    • 38549138136 scopus 로고    scopus 로고
    • Software mitigations to hedge AES against cache-based software side channel vulnerabilities
    • 2006
    • BRICKELL, E., GRAUNKE, G., NEVE, M., and SEIFERT, J.-P. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR Cryptology ePrint Archive 2006 (2006), 52.
    • (2006) IACR Cryptology EPrint Archive , pp. 52
    • Brickell, E.1    Graunke, G.2    Neve, M.3    Seifert, J.-P.4
  • 12
    • 84875649201 scopus 로고    scopus 로고
    • Iago attacks: Why the system call API is a bad untrusted RPC interface
    • CHECKOWAY, S., and SHACHAM, H. Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface. In ASPLOS (2013).
    • (2013) ASPLOS
    • Checkoway, S.1    Shacham, H.2
  • 16
    • 84897782769 scopus 로고    scopus 로고
    • Virtual ghost: Protecting applications from hostile operating systems
    • CRISWELL, J., DAUTENHAHN, N., and ADVE, V. Virtual Ghost: Protecting Applications from Hostile Operating Systems. In ASPLOS (2014).
    • (2014) ASPLOS
    • Criswell, J.1    Dautenhahn, N.2    Adve, V.3
  • 17
    • 85080678216 scopus 로고    scopus 로고
    • Dec.
    • CVE-ID: CVE-2014-9357. Available from MITRE at https://cve.mitre.org, Dec. 2014.
    • (2014) CVE-ID: CVE-2014-9357
  • 18
    • 85080729884 scopus 로고    scopus 로고
    • May
    • CVE-ID: CVE-2015-3456. Available from MITRE at https://cve.mitre.org, May 2015.
    • (2015) CVE-ID: CVE-2015-3456
  • 19
    • 85080660267 scopus 로고    scopus 로고
    • Aug.
    • CVE-ID: CVE-2015-5154. Available from MITRE at https://cve.mitre.org, Aug. 2015.
    • (2015) CVE-ID: CVE-2015-5154
  • 20
    • 33847753565 scopus 로고    scopus 로고
    • The transport layer security (TLS) protocol version 1.2
    • Aug. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685
    • DIERKS, T., and RESCORLA, E. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685.
    • (2008) RFC 5246 (Proposed Standard)
    • Dierks, T.1    Rescorla, E.2
  • 22
    • 84937435024 scopus 로고    scopus 로고
    • An updated performance comparison of virtual machines and linux containers
    • FELTER, W., FERREIRA, A., RAJAMONY, R., and RUBIO, J. An updated performance comparison of virtual machines and Linux containers. In ISPASS (2015).
    • (2015) ISPASS
    • Felter, W.1    Ferreira, A.2    Rajamony, R.3    Rubio, J.4
  • 23
    • 55549119760 scopus 로고    scopus 로고
    • Distributed caching with memcached
    • Aug.
    • FITZPATRICK, B. Distributed caching with memcached. Linux Journal (Aug. 2004).
    • (2004) Linux Journal
    • Fitzpatrick, B.1
  • 25
    • 85080696243 scopus 로고    scopus 로고
    • HAPROXY. http://www.haproxy.org, 2016.
    • (2016) HAPROXY
  • 26
    • 84914168458 scopus 로고    scopus 로고
    • Using innovative instructions to create trustworthy software solutions
    • HOEKSTRA, M., LAL, R., PAPPACHAN, P., PHEGADE, V., and DEL CUVILLO, J. Using Innovative Instructions to Create Trustworthy Software Solutions. In HASP (2013).
    • (2013) HASP
    • Hoekstra, M.1    Lal, R.2    Pappachan, P.3    Phegade, V.4    Del Cuvillo, J.5
  • 27
    • 84875683130 scopus 로고    scopus 로고
    • InkTag: Secure applications on an untrusted operating system
    • HOFMANN, O. S., KIM, S., DUNN, A. M., and LEE, M. Z., and WITCHEL, E. InkTag: Secure Applications on an Untrusted Operating System. In ASPLOS (2013).
    • (2013) ASPLOS
    • Hofmann, O.S.1    Kim, S.2    Dunn, A.M.3    Lee, M.Z.4    Witchel, E.5
  • 28
    • 85080644587 scopus 로고    scopus 로고
    • INITIATIVE, T. O. C. https://www.opencontainers.org, 2016.
    • (2016)
  • 31
    • 85080791204 scopus 로고    scopus 로고
    • October
    • INTEL CORP. Product Change Notification 114074-00. https://qdms.intel.com/dm/i.aspx/5A160770-FC47-47A0-BF8A-062540456F0A/PCN114074-00.pdf, October 2015.
    • (2015) Product Change Notification 114074-00
  • 34
    • 85080744682 scopus 로고    scopus 로고
    • IOZONE. http://www.iozone.org, 2016.
    • (2016) IOZONE
  • 35
    • 85080635844 scopus 로고    scopus 로고
    • KUBERNETES. http://kubernetes.io, 2016.
    • (2016) KUBERNETES
  • 36
    • 84975270356 scopus 로고    scopus 로고
    • Sego: Pervasive trusted metadata for efficiently verified untrusted system services
    • KWON, Y., and DUNN, A. M., LEE, M. Z., HOFMANN, O. S., XU, Y., and WITCHEL, E. Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services. In ASPLOS (2016).
    • (2016) ASPLOS
    • Kwon, Y.1    Dunn, A.M.2    Lee, M.Z.3    Hofmann, O.S.4    Xu, Y.5    Witchel, E.6
  • 38
    • 85080793158 scopus 로고    scopus 로고
    • LIBC, M. https://www.musl-libc.org, 2016.
    • (2016) LIBC, M.
  • 42
    • 84926444656 scopus 로고    scopus 로고
    • Docker: Lightweight linux containers for consistent development and deployment
    • Mar.
    • MERKEL, D. Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal (Mar. 2014).
    • (2014) Linux Journal
    • Merkel, D.1
  • 44
    • 85080660609 scopus 로고    scopus 로고
    • PROJECT, A. H. S. https://httpd.apache.org, 2016.
    • (2016)
  • 46
    • 85080769528 scopus 로고    scopus 로고
    • REDIS. http://redis.io, 2016.
    • (2016) REDIS
  • 47
    • 84857955714 scopus 로고    scopus 로고
    • Nginx: The high-performance web server and reverse proxy
    • Sept.
    • REESE, W. Nginx: the High-Performance Web Server and Reverse Proxy. Linux Journal (Sept. 2008).
    • (2008) Linux Journal
    • Reese, W.1
  • 48
    • 85080766613 scopus 로고    scopus 로고
    • RKT (COREOS). https://coreos.com/rkt, 2016.
    • (2016) RKT (COREOS)
  • 49
    • 84897768729 scopus 로고    scopus 로고
    • Using ARM TrustZone to build a trusted language runtime for mobile applications
    • SANTOS, N., RAJ, H., SAROIU, S., and WOLMAN, A. Using ARM TrustZone to build a trusted language runtime for mobile applications. In ASPLOS (2014).
    • (2014) ASPLOS
    • Santos, N.1    Raj, H.2    Saroiu, S.3    Wolman, A.4
  • 52
    • 82155174764 scopus 로고    scopus 로고
    • FlexSC: Flexible system call scheduling with exception-less system calls
    • SOARES, L., and STUMM, M. FlexSC: Flexible System Call Scheduling with Exception-less System Calls. In OSDI (2010).
    • (2010) OSDI
    • Soares, L.1    Stumm, M.2
  • 53
    • 35448941069 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
    • Mar.
    • SOLTESZ, S., PÖTZL, H., FIUCZYNSKI, M. E., BAVIER, A., AND PETERSON, L. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. SIGOPS OSR (Mar. 2007).
    • (2007) SIGOPS OSR
    • Soltesz, S.1    Pötzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 54
    • 85080771749 scopus 로고    scopus 로고
    • SQLCIPHER. https://www.zetetic.net/sqlcipher, 2016.
    • (2016) SQLCIPHER
  • 55
    • 85080724268 scopus 로고    scopus 로고
    • SQLite. https://www.sqlite.org, 2016.
    • (2016) SQLite
  • 56
    • 85080717160 scopus 로고    scopus 로고
    • SWARM, D. https://docs.docker.com/swarm, 2016.
    • (2016)
    • Swarm, D.1
  • 57
    • 85069458084 scopus 로고    scopus 로고
    • Splitting interfaces: Making trust between applications and operating systems configurable
    • TA-MIN, R., LITTY, L., and LIE, D. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In OSDI (2006).
    • (2006) OSDI
    • Ta-Min, R.1    Litty, L.2    Lie, D.3
  • 58
    • 84922850962 scopus 로고    scopus 로고
    • Microservices
    • THONES, J. Microservices. IEEE Software 32, 1 (2015), 116-116.
    • (2015) IEEE Software , vol.32 , Issue.1 , pp. 116-116
    • Thones, J.1
  • 63
    • 84945197313 scopus 로고    scopus 로고
    • Controlled-channel attacks: Deterministic side channels for untrusted operating systems
    • XU, Y., CUI, W., and PEINADO, M. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In S&P (2015).
    • (2015) S&P
    • Xu, Y.1    Cui, W.2    Peinado, M.3
  • 64
    • 77952404303 scopus 로고    scopus 로고
    • Using hypervisor to provide data secrecy for user applications on a per-page basis
    • YANG, J., and SHIN, K. G. Using Hypervisor to Provide Data Secrecy for User Applications on a Per-page Basis. In VEE (2008).
    • (2008) VEE
    • Yang, J.1    Shin, K.G.2
  • 65
    • 85054861572 scopus 로고    scopus 로고
    • NSA hacker chief explains how to keep him out of your system
    • Jan.
    • ZETTER, K. NSA Hacker Chief Explains How to Keep Him Out of Your System. Wired (Jan. 2016).
    • (2016) Wired
    • Zetter, K.1
  • 66
    • 82655179240 scopus 로고    scopus 로고
    • CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
    • ZHANG, F., CHEN, J., CHEN, H., and ZANG, B. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. In SOSP (2011).
    • (2011) SOSP
    • Zhang, F.1    Chen, J.2    Chen, H.3    Zang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.