[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zegzhda et al., 2018 - Google Patents

Ensuring Secure Data Input/Output Operations for SGX ENCLAVE

Zegzhda et al., 2018

Document ID
8489379572022544023
Author
Zegzhda D
Usov E
Nikol’skii A
Pavlenko E
Publication year
Publication venue
Automatic Control and Computer Sciences

External Links

Snippet

This paper investigates the problem of ensuring secure input/output operations in the Intel SGX technology. The problem is extremely urgent, and its solution will make it possible to protect confidential user data from attacks from different malicious software while finding …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US10902133B2 (en) Computational operations in enclave computing environments
Hashizume et al. An analysis of security issues for cloud computing
US9177164B2 (en) System and method for a parallel world of security for non secure environments
US11755753B2 (en) Mechanism to enable secure memory sharing between enclaves and I/O adapters
KR101745843B1 (en) Methods and devices for protecting private data
GB2515536A (en) Processing a guest event in a hypervisor-controlled system
EP3776223B1 (en) Secured computer system
JP2022541796A (en) Secure runtime system and method
KR20160097892A (en) Apparatus and method for security service based virtualization
CN114930328A (en) Binding a secure object of a security module to a secure guest
US9111123B2 (en) Firmware for protecting data from software threats
Liu et al. $ LiveForen $: Ensuring Live Forensic Integrity in the Cloud
JP2022523770A (en) Secure execution guest owner control for secure interface control
Noubir et al. Trusted code execution on untrusted platforms using Intel SGX
Zegzhda et al. Use of Intel SGX to ensure the confidentiality of data of cloud users
Mofrad et al. Leveraging Intel SGX to create a nondisclosure cryptographic library
Srivastava et al. Security Issues in Cloud Computing
Zegzhda et al. Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Huang et al. Pearl-TEE: supporting untrusted applications in trustzone
JP2024527003A (en) Sensitive Data Encryption
Gligor Security limitations of virtualization and how to overcome them
US20240380595A1 (en) Untrusted Multi-Party Compute System
Singh et al. Secure Computing: NGSCB’s Journey and Windows Security Impact
Kuan Improving the Security of KMS on a Cloud Platform Using Trusted Hardware
Jung et al. An architecture for virtualization-based trusted execution environment on mobile devices