The ultimate tool for data privacy: Fully homomorphic encryptionTechnical noteOmri Soceanu and Ronen Levy08 Dec 2022Cloud SecurityFully Homomorphic EncryptionSecurity
Extending server integrity across space and time with Durable AttestationTechnical noteDaniele Buono, Marcio Augusto de Lima e Silva, Maurizio Drocco, Gheorghe Almasi, and James Bottomley14 Nov 2022Cloud Security
Strengthening cloud security with confidential computingTechnical noteRick Boivie04 Nov 2022Cloud SecurityConfidential ComputingSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
SysFlowA cloud-native system telemetry framework that enables the creation of security analytics on a scalable, pluggable open-source platform.
A Policy Framework for Securing Cloud APIs by Combining Application Context with Generative AIShriti PriyaJulian James Stephen2024ACSAC 2024
From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology PoisoningMingming ChenTom La Portaet al.2024CCS 2024
SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng WangYicheng Guanget al.2024USENIX Security 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterLimin YangZhi Chenet al.2024USENIX Security 2024