2018 IEEE International Conference on Cloud Engineering (IC2E) 2018
DOI: 10.1109/ic2e.2018.00032
|View full text |Cite
|
Sign up to set email alerts
|

UniGuard: Protecting Unikernels Using Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…However, this approach incurs challenges due to the Intel SGX limitations (e.g., larger TCB and database functionality). Another approach is to put the whole key-value storage codes outside of SGX and allow Intel SGX application to load/store encrypted secret data from/to key-value storage [47]. While it ensures the confidentiality of data stored in the untrusted region, it also discloses the database codes to attackers.…”
Section: ) Motivationmentioning
confidence: 99%
“…However, this approach incurs challenges due to the Intel SGX limitations (e.g., larger TCB and database functionality). Another approach is to put the whole key-value storage codes outside of SGX and allow Intel SGX application to load/store encrypted secret data from/to key-value storage [47]. While it ensures the confidentiality of data stored in the untrusted region, it also discloses the database codes to attackers.…”
Section: ) Motivationmentioning
confidence: 99%
“…Essentially, the latter category of studies port an entire unikernel into an enclave to provide lightweight OS support to the application. Contrariwise, Sfyrakis et al [46] propose the adoption of SGX to secure only some computations of a MirageOS unikernel [27]. In this position paper, we lay the foundations for a solution where unikernels -of different or same typology-run tasks of distinct criticality in SGX enclaves.…”
Section: Enhancing Isolation Via Intel Sgxmentioning
confidence: 99%