Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Profiling with trust: system monitoring from trusted execution environments
Design Automation for Embedded Systems (DAES), Volume 28, Issue 1Pages 23–44https://doi.org/10.1007/s10617-024-09283-1AbstractLarge-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) ...
- research-articleOctober 2019
TEEMo: trusted peripheral monitoring for optical networks and beyond
SysTEX '19: Proceedings of the 4th Workshop on System Software for Trusted ExecutionArticle No.: 7, Pages 1–6https://doi.org/10.1145/3342559.3365339Recent trends like edge computing move metro and core network elements from access restricted back offices to data centers where their attack surface is exposed to a larger audience. These trends increase the need for means of monitoring these network ...
- articleAugust 2009
Towards 100G packet processing: Challenges and technologies
Driven by media-rich and bandwidth-intensive Internet applications, 100 Gigabit Ethernet embodies the next logical and necessary line speed following 10G-40G, although enormous challenges exist. Can today's device technologies scale, or will new, ...