Zegzhda et al., 2018 - Google Patents
Ensuring Secure Data Input/Output Operations for SGX ENCLAVEZegzhda et al., 2018
- Document ID
- 8489379572022544023
- Author
- Zegzhda D
- Usov E
- Nikol’skii A
- Pavlenko E
- Publication year
- Publication venue
- Automatic Control and Computer Sciences
External Links
Snippet
This paper investigates the problem of ensuring secure input/output operations in the Intel SGX technology. The problem is extremely urgent, and its solution will make it possible to protect confidential user data from attacks from different malicious software while finding …
- 238000005516 engineering process 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10902133B2 (en) | Computational operations in enclave computing environments | |
Hashizume et al. | An analysis of security issues for cloud computing | |
US9177164B2 (en) | System and method for a parallel world of security for non secure environments | |
US11755753B2 (en) | Mechanism to enable secure memory sharing between enclaves and I/O adapters | |
KR101745843B1 (en) | Methods and devices for protecting private data | |
GB2515536A (en) | Processing a guest event in a hypervisor-controlled system | |
EP3776223B1 (en) | Secured computer system | |
JP2022541796A (en) | Secure runtime system and method | |
KR20160097892A (en) | Apparatus and method for security service based virtualization | |
CN114930328A (en) | Binding a secure object of a security module to a secure guest | |
US9111123B2 (en) | Firmware for protecting data from software threats | |
Liu et al. | $ LiveForen $: Ensuring Live Forensic Integrity in the Cloud | |
JP2022523770A (en) | Secure execution guest owner control for secure interface control | |
Noubir et al. | Trusted code execution on untrusted platforms using Intel SGX | |
Zegzhda et al. | Use of Intel SGX to ensure the confidentiality of data of cloud users | |
Mofrad et al. | Leveraging Intel SGX to create a nondisclosure cryptographic library | |
Srivastava et al. | Security Issues in Cloud Computing | |
Zegzhda et al. | Ensuring Secure Data Input/Output Operations for SGX ENCLAVE | |
Huang et al. | Pearl-TEE: supporting untrusted applications in trustzone | |
JP2024527003A (en) | Sensitive Data Encryption | |
Gligor | Security limitations of virtualization and how to overcome them | |
US20240380595A1 (en) | Untrusted Multi-Party Compute System | |
Singh et al. | Secure Computing: NGSCB’s Journey and Windows Security Impact | |
Kuan | Improving the Security of KMS on a Cloud Platform Using Trusted Hardware | |
Jung et al. | An architecture for virtualization-based trusted execution environment on mobile devices |