Search Results - "Fetzer, Christof"

Refine Results
  1. 1

    Confidential computing and related technologies: a critical review by Sardar, Muhammad Usama, Fetzer, Christof

    Published in Cybersecurity (Singapore) (01-12-2023)
    “…This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the…”
    Get full text
    Journal Article
  2. 2

    Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification by Sardar, Muhammad Usama, Musaev, Saidgani, Fetzer, Christof

    Published in IEEE access (2021)
    “…In August 2020, Intel asked the research community for feedback on the newly offered architecture extensions, called Intel Trust Domain Extensions (TDX), which…”
    Get full text
    Journal Article
  3. 3

    Cost-based Virtual Machine Scheduling for Data-as-a-Service by Oliveira, Ana Cristina Alves de, Spohn, Marco Aurélio, Fetzer, Christof, Do, Le Quoc, Martin, André

    “…Data-as-a-Service (DaaS) is a branch of cloud computing that supports "querying the Web". Due to its ultrahigh scale, it is essential to establish rules when…”
    Get full text
    Journal Article
  4. 4

    Secure end-to-end processing of smart metering data by Brito, Andrey, Fetzer, Christof, Köpsell, Stefan, Pietzuch, Peter, Pasin, Marcelo, Felber, Pascal, Fonseca, Keiko, Rosa, Marcelo, Gomes, Luiz, Riella, Rodrigo, Prado, Charles, Rust, Luiz F., Lucani, Daniel E., Sipos, Márton, Nagy, László, Fehér, Marcell

    “…Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in…”
    Get full text
    Journal Article
  5. 5

    Revizor: Testing Black-Box CPUs Against Speculation Contracts by Oleksenko, Oleksii, Fetzer, Christof, Kopf, Boris, Silberstein, Mark

    Published in IEEE MICRO (01-07-2023)
    “…Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These…”
    Get full text
    Journal Article
  6. 6

    SGXTuner: Performance Enhancement of Intel SGX Applications via Stochastic Optimization by Mazzeo, Giovanni, Arnautov, Sergei, Fetzer, Christof, Romano, Luigi

    “…Intel SGX has started to be widely adopted. Cloud providers (Microsoft Azure, IBM Cloud, Alibaba Cloud) are offering new solutions, implementing data-in-use…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Time-Based Software Transactional Memory by Felber, Pascal, Fetzer, Christof, Marlier, Patrick, Riegel, Torvald

    “…Software transactional memory (STM) is a concurrency control mechanism that is widely considered to be easier to use by programmers than other mechanisms such…”
    Get full text
    Journal Article
  9. 9

    INSPECTOR: Data Provenance Using Intel Processor Trace (PT) by Thalheim, Jorg, Bhatotia, Pramod, Fetzer, Christof

    “…Data provenance strives for explaining how the computation was performed by recording a trace of the execution. The provenance trace is useful across a…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    BROFY: Towards Essential Integrity Protection for Microservices by Hartono, Ardhi Putra Pratama, Fetzer, Christof

    “…Trusted computing has emerged as one of the main components in a critical microservice application. A powerful adversary such as the cloud provider could harm…”
    Get full text
    Conference Proceeding
  11. 11

    Auto-scaling techniques for elastic data stream processing by Heinze, Thomas, Pappalardo, Valerio, Jerzak, Zbigniew, Fetzer, Christof

    “…An elastic data stream processing system is able to handle changes in workload by dynamically scaling out and scaling in. This allows for handling of…”
    Get full text
    Conference Proceeding
  12. 12

    Vertical Scaling for Prioritized VMs Provisioning by Yazdanov, L., Fetzer, C.

    “…The elastic scaling of services permits us (1) to meet service provisioning requirements (i.e., not to violate its SLAs), and (2) to efficiently use available…”
    Get full text
    Conference Proceeding
  13. 13

    TEE-Perf: A Profiler for Trusted Execution Environments by Bailleu, Maurice, Dragoti, Donald, Bhatotia, Pramod, Fetzer, Christof

    “…We introduce TEE-PERF, an architecture-and platform-independent performance measurement tool for trusted execution environments (TEEs). More specifically,…”
    Get full text
    Conference Proceeding
  14. 14

    SGX-Aware Container Orchestration for Heterogeneous Clusters by Vaucher, Sebastien, Pires, Rafael, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio, Fetzer, Christof

    “…Containers are becoming the de facto standard to package and deploy applications and micro-services in the cloud. Several cloud providers (e.g., Amazon,…”
    Get full text
    Conference Proceeding
  15. 15

    Scalable Network Traffic Classification Using Distributed Support Vector Machines by Quoc, Do Le, D'Alessandro, Valerio, Park, Byungchul, Romano, Luigi, Fetzer, Christof

    “…Internet traffic has increased dramatically in recent years due to the popularization of the Internet and the appearance of wireless Internet mobile devices…”
    Get full text
    Conference Proceeding Journal Article
  16. 16

    ControlFreak: Signature Chaining to Counter Control Flow Attacks by Arnautov, Sergei, Fetzer, Christof

    “…Many modern embedded systems use networks to communicate. This increases the attack surface: the adversary does not need to have physical access to the system…”
    Get full text
    Conference Proceeding Journal Article
  17. 17

    x0394;-Encoding: Practical Encoded Processing by Kuvaiskii, Dmitrii, Fetzer, Christof

    “…Transient and permanent errors in memory and CPUs occur with alarming frequency. Although most of these errors are masked at the hardware level or result in…”
    Get full text
    Conference Proceeding
  18. 18

    ADAM-CS: Advanced Asynchronous Monotonic Counter Service by Martin, Andre, Lian, Cong, Gregor, Franz, Krahn, Robert, Schiavoni, Valerio, Felber, Pascal, Fetzer, Christof

    “…Trusted execution environments (TEEs) offer the technological breakthrough to allow several applications to be deployed and executed over untrusted public…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20

    Chained Signatures for Secure Program Execution by Arnautov, Sergei, Fetzer, Christof

    “…Every somewhat complex computer system contains bugs. As it is nearly impossible to fix all bugs in the software stack, the only alternative remains is to make…”
    Get full text
    Conference Proceeding