Search Results - "Fetzer, Christof"
-
1
Confidential computing and related technologies: a critical review
Published in Cybersecurity (Singapore) (01-12-2023)“…This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the…”
Get full text
Journal Article -
2
Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification
Published in IEEE access (2021)“…In August 2020, Intel asked the research community for feedback on the newly offered architecture extensions, called Intel Trust Domain Extensions (TDX), which…”
Get full text
Journal Article -
3
Cost-based Virtual Machine Scheduling for Data-as-a-Service
Published in J.UCS (Annual print and CD-ROM archive ed.) (01-01-2023)“…Data-as-a-Service (DaaS) is a branch of cloud computing that supports "querying the Web". Due to its ultrahigh scale, it is essential to establish rules when…”
Get full text
Journal Article -
4
Secure end-to-end processing of smart metering data
Published in Journal of cloud computing : advances, systems and applications (04-12-2019)“…Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in…”
Get full text
Journal Article -
5
Revizor: Testing Black-Box CPUs Against Speculation Contracts
Published in IEEE MICRO (01-07-2023)“…Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These…”
Get full text
Journal Article -
6
SGXTuner: Performance Enhancement of Intel SGX Applications via Stochastic Optimization
Published in IEEE transactions on dependable and secure computing (01-07-2022)“…Intel SGX has started to be widely adopted. Cloud providers (Microsoft Azure, IBM Cloud, Alibaba Cloud) are offering new solutions, implementing data-in-use…”
Get full text
Journal Article -
7
Capacity planning for dependable services
Published in Theoretical computer science (17-10-2023)Get full text
Journal Article -
8
Time-Based Software Transactional Memory
Published in IEEE transactions on parallel and distributed systems (01-12-2010)“…Software transactional memory (STM) is a concurrency control mechanism that is widely considered to be easier to use by programmers than other mechanisms such…”
Get full text
Journal Article -
9
INSPECTOR: Data Provenance Using Intel Processor Trace (PT)
Published in 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) (01-06-2016)“…Data provenance strives for explaining how the computation was performed by recording a trace of the execution. The provenance trace is useful across a…”
Get full text
Conference Proceeding Journal Article -
10
BROFY: Towards Essential Integrity Protection for Microservices
Published in 2021 40th International Symposium on Reliable Distributed Systems (SRDS) (01-09-2021)“…Trusted computing has emerged as one of the main components in a critical microservice application. A powerful adversary such as the cloud provider could harm…”
Get full text
Conference Proceeding -
11
Auto-scaling techniques for elastic data stream processing
Published in 2014 IEEE 30th International Conference on Data Engineering Workshops (01-03-2014)“…An elastic data stream processing system is able to handle changes in workload by dynamically scaling out and scaling in. This allows for handling of…”
Get full text
Conference Proceeding -
12
Vertical Scaling for Prioritized VMs Provisioning
Published in 2012 Second International Conference on Cloud and Green Computing (01-11-2012)“…The elastic scaling of services permits us (1) to meet service provisioning requirements (i.e., not to violate its SLAs), and (2) to efficiently use available…”
Get full text
Conference Proceeding -
13
TEE-Perf: A Profiler for Trusted Execution Environments
Published in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2019)“…We introduce TEE-PERF, an architecture-and platform-independent performance measurement tool for trusted execution environments (TEEs). More specifically,…”
Get full text
Conference Proceeding -
14
SGX-Aware Container Orchestration for Heterogeneous Clusters
Published in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (01-07-2018)“…Containers are becoming the de facto standard to package and deploy applications and micro-services in the cloud. Several cloud providers (e.g., Amazon,…”
Get full text
Conference Proceeding -
15
Scalable Network Traffic Classification Using Distributed Support Vector Machines
Published in 2015 IEEE 8th International Conference on Cloud Computing (01-06-2015)“…Internet traffic has increased dramatically in recent years due to the popularization of the Internet and the appearance of wireless Internet mobile devices…”
Get full text
Conference Proceeding Journal Article -
16
ControlFreak: Signature Chaining to Counter Control Flow Attacks
Published in 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS) (01-09-2015)“…Many modern embedded systems use networks to communicate. This increases the attack surface: the adversary does not need to have physical access to the system…”
Get full text
Conference Proceeding Journal Article -
17
x0394;-Encoding: Practical Encoded Processing
Published in 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01-06-2015)“…Transient and permanent errors in memory and CPUs occur with alarming frequency. Although most of these errors are masked at the hardware level or result in…”
Get full text
Conference Proceeding -
18
ADAM-CS: Advanced Asynchronous Monotonic Counter Service
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2021)“…Trusted execution environments (TEEs) offer the technological breakthrough to allow several applications to be deployed and executed over untrusted public…”
Get full text
Conference Proceeding -
19
Federated and secure cloud services for building medical image classifiers on an intercontinental infrastructure
Published in Future generation computer systems (01-09-2020)“…Medical data processing has found a new dimension with the extensive use of machine-learning techniques to classify and extract features. Machine learning…”
Get full text
Journal Article -
20
Chained Signatures for Secure Program Execution
Published in 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (01-10-2014)“…Every somewhat complex computer system contains bugs. As it is nearly impossible to fix all bugs in the software stack, the only alternative remains is to make…”
Get full text
Conference Proceeding