Cloud Security
We’re working on building the most secure cloud infrastructure platforms. Our research focuses on ensuring the integrity of everything in the stack, reducing the attack surface of cloud systems, and advancing the use of confidential computing and hardware security modules.
Our work
Open source workload identity management could help secure hybrid clouds
ReleaseIBM boosts software supply chain security with signature-based Kubernetes verification
ReleaseNew open source tool automates compliance
ReleaseAfter an unpredictable 2020, here’s what to expect for hybrid cloud in 2021
News
Tools + code
Virtual TPM
Libtpms-based Trusted Platform Module (TPM) emulator with socket, character device, and Linux CUSE interface.
View project →IMA: Integrity Management Architecture
A kernel integrity subsystem that detects if files have been accidentally or maliciously altered, both remotely and locally, appraises a file's measurement against a "good" value stored as an extended attribute, and enforces local file integrity.
View project →
Publications
- 2022
- LSS 2022
- 2022
- Cloud S&P 2022
- 2022
- S&P 2022
- 2022
- SAC 2022
- 2021
- BigData Congress 2021
- 2021
- KVM Forum 2021