2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS) 2018
DOI: 10.1109/srds.2018.00042
|View full text |Cite
|
Sign up to set email alerts
|

Security, Performance and Energy Implications of Hardware-Assisted Memory Protection Mechanisms on Event-Based Streaming Systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In system emulation mode QEMU emulates an entire machine, dynamically translating different hardware instruction sets when running a virtual machine with a different architecture. In order to provide full network capability, we replace the default SLiRP network 12 deployed with Op-Tee by a bridged network with a tap device.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In system emulation mode QEMU emulates an entire machine, dynamically translating different hardware instruction sets when running a virtual machine with a different architecture. In order to provide full network capability, we replace the default SLiRP network 12 deployed with Op-Tee by a bridged network with a tap device.…”
Section: Discussionmentioning
confidence: 99%
“…Edge devices are typically low-energy units with limited processing and storage capacity. As such, it is unpractical to rely on sophisticated software-based protection mechanisms (e.g., homomorphic encryption [20]), currently due to their high processing requirements and low performance [12]. Alternatively, new hardware-based protection mechanisms can be easily leveraged by programmers to provide the mentioned protection guarantees.…”
Section: Introductionmentioning
confidence: 99%
“…At present, building security based on hardware entities has become the hot issues in the security field. The common hardware security mechanisms on computing nodes include TPCM, 16 TCM, TPM, TXT, SGX, password card, 17 and TrustZone 18 . Each mechanism constructs an isolated resource environment for security protection through security dedicated hardware resources.…”
Section: Introductionmentioning
confidence: 99%