Go to:
Logótipo
Você está em: Start > Publications > View > Hardening cryptographic operations through the use of secure enclaves
Map of Premises
Principal
Publication

Hardening cryptographic operations through the use of secure enclaves

Title
Hardening cryptographic operations through the use of secure enclaves
Type
Article in International Scientific Journal
Year
2021
Authors
Brandao, A
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Title: COMPUTERS & SECURITYImported from Authenticus Search for Journal Publications
Vol. 108
ISSN: 0167-4048
Other information
Authenticus ID: P-00V-WAN
Abstract (EN): With the rising popularity of the cloud, companies lose control of both the hardware and the operating system responsible for hosting their software and data. This means that companies are at risk of losing confidential data when these are utilized in components controlled by a third-party cloud vendor. Secure enclaves can help solve this problem by creating a secure environment where code can be executed securely, guaranteeing that no unwanted parties read or modify the data inside this secure environment. While the use of secure enclaves has been focused on small footprints software, such as the implementation of trusted computing base for distributed protocols, we analyze the strengths and shortcoming of current tools in an effort to further expand the applicability of their use. Given the importance of web servers and their inherent greater exposure to attacks, we explore the hardening of Apache web server through the use of secure enclaves. This was accomplished by making the necessary modifications to further protect its private key from both the operating system and hypervisor. We also provide a performance assessment to quantify the overhead associated with the use of secure enclaves, namely, Intel SGX.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 19
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Towards a Modular On-Premise Approach for Data Sharing (2021)
Article in International Scientific Journal
Resende, JS; Magalhaes, L; Brandao, A; Martins, R; antunes, l
Employment of Secure Enclaves in Cheat Detection Hardening (2020)
Article in International Conference Proceedings Book
Brandao, A; Resende, JS; Martins, R

Of the same journal

Triple-Similarity Mechanism for alarm management in the cloud (2018)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
IoT security certifications: Challenges and potential approaches (2022)
Article in International Scientific Journal
Cirne, A; Sousa, PR; Resende, JS; antunes, l
Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication (2023)
Article in International Scientific Journal
Freitas, T; Soares, J; Manuel E Correia; Martins, R
Caller-REP: Detecting unwanted calls with caller social strength (2013)
Article in International Scientific Journal
Azad, MA; Ricardo Morla

See all (6)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-14 at 12:30:50 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book