Cloud Security
We’re working on building the most secure cloud infrastructure platforms. Our research focuses on ensuring the integrity of everything in the stack, reducing the attack surface of cloud systems, and advancing the use of confidential computing and hardware security modules.
Our work
How do you measure innovation?
NewsThe ultimate tool for data privacy: Fully homomorphic encryption
Technical noteExtending server integrity across space and time with Durable Attestation
Technical noteStrengthening cloud security with confidential computing
Technical noteWhat is confidential computing?
ExplainerOpen source workload identity management could help secure hybrid clouds
Release- See more of our work on Cloud Security
Projects
SysFlow
A cloud-native system telemetry framework that enables the creation of security analytics on a scalable, pluggable open-source platform.
- Cloud Security
- Security Analysis
- Threat Management
Publications
- 2023
- CODS-COMAD 2023
- 2022
- Big Data 2022
- 2022
- EMNLP 2022
- 2022
- ACSAC 2022
- 2022
- WISE 2022
- 2022
- MICRO 2022
Tools + code
Virtual TPM
Libtpms-based Trusted Platform Module (TPM) emulator with socket, character device, and Linux CUSE interface.
View project →IMA: Integrity Management Architecture
A kernel integrity subsystem that detects if files have been accidentally or maliciously altered, both remotely and locally, appraises a file's measurement against a "good" value stored as an extended attribute, and enforces local file integrity.
View project →