Due to the absence of in-enclave isolation, today's trusted execution environment (TEE), specifically Intel's Software Guard Extensions (SGX), does not have the capability to securely run different users' tasks within a single enclave, which is required for supporting real-world services, such as an in-enclave machine learning model that classifies the data from various sources, or a microservice (e.g., data search) that performs a very small task (within sub-seconds) for a user and therefore cannot afford the resources and the delay for creating a separate enclave for each user. To address this challenge, we developed , a technique that enables lightweight, verifiable in-enclave user isolation for protecting time-sharing services. Our approach restricts an in-enclave thread's privilege when configuring an enclave, and further performs integrity check and sanitization on critical enclave data upon user switches. For this purpose, we developed a novel technique that ensures the protection of sensitive user data (e.g., session keys) even in the presence of the adversary who may have compromised the enclave. Our study shows that the new technique is lightweight (1% overhead) and verifiable (about 3200 lines of code), making a step towards assured protection of real-world in-enclave services.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10751023 | PMC |
http://dx.doi.org/10.1109/tdsc.2021.3138427 | DOI Listing |
Sensors (Basel)
January 2025
School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China.
With the demand for high-safety, high-integration, and lightweight micro- and nano-electronic components, an MEMS electromagnetic energy-releasing component was innovatively designed based on the corona discharge theory. The device subverted the traditional device-level protection method for electromagnetic energy, realizing the innovation of adding a complex circuit system to the integrated chip through micro-nanometer processing technology and enhancing the chip's size from the centimeter level to the micron level. In this paper, the working performance of the MEMS electromagnetic energy-releasing component was verified through a combination of a simulation, a static experiment, and a dynamic test, and a characterization test of the tested MEMS electromagnetic energy-releasing component was carried out to thoroughly analyze the effect of the MEMS electromagnetic energy-releasing component.
View Article and Find Full Text PDFMaterials (Basel)
December 2024
Suzhou XDM 3D Printing Technology Co., Ltd., Suzhou 215000, China.
The stress distribution within the struts of lattice metamaterials is non-uniform under compressive loads, with stress concentrations typically occurring at the node regions. Inspired by bamboo, this study proposes a type of body-centered cubic (BCC) lattice metamaterial with tapered prism struts (BCCT). The compressive behavior, deformation modes, mechanical properties, and failure mechanisms of BCCT lattice metamaterials are systematically analyzed using finite element methods and validated through compression tests.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Mathematics and Computer Science, Yunnan Minzu University, Kunming 650504, China.
Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However, designing an AKA protocol for IoT presents significant challenges, as most IoT sensors are deployed in resource-constrained, unattended environments with limited computational power, connectivity, and storage. To achieve anonymous authentication, existing solutions typically rely on shared temporary public keys to mask device IDs or validate sender certificates, which increases the computational overhead.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Department of P & M, PIR Mehr Ali Shah Arid Agriculture University, Rawalpindi 46000, Pakistan.
The vast interconnection of resource-constrained devices and the immense amount of data exchange in the Internet of Things (IoT) environment resulted in the resurgence of various security threats. This resource-constrained environment of IoT makes data security a very challenging task. Recent trends in integrating lightweight cryptographic algorithms have significantly improved data security in the IoT without affecting performance.
View Article and Find Full Text PDFMicromachines (Basel)
November 2024
Department of Microsystem Technology, University of Applied Sciences Berlin, 12459 Berlin, Germany.
Shock wave boundary/layer interactions (SWBLIs) are critical in high-speed aerodynamic flows, particularly within supersonic regimes, where unsteady dynamics can induce structural fatigue and degrade vehicle performance. Conventional measurement techniques, such as pressure-sensitive paint (PSP), face limitations in frequency response, calibration complexity, and intrusive instrumentation. Similarly, MEMS-based sensors, like Kulite sensors, present challenges in terms of intrusiveness, cost, and integration complexity.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!