Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperApril 2024
Serverless Confidential Containers: Challenges and Opportunities
SESAME '24: Proceedings of the 2nd Workshop on SErverless Systems, Applications and MEthodologiesPages 32–40https://doi.org/10.1145/3642977.3652097Serverless computing allows users to execute pieces of code (so called functions) on-demand in the cloud without having to provision any hardware resources. However, by executing in the cloud and delegating control over hardware resources, the integrity ...
- research-articleFebruary 2024
Veil: A Protected Services Framework for Confidential Virtual Machines
ASPLOS '23: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4Pages 378–393https://doi.org/10.1145/3623278.3624763Confidential virtual machines (CVMs) enabled by AMD SEV provide a protected environment for sensitive computations on an untrusted cloud. Unfortunately, CVMs are typically deployed with huge and vulnerable operating system kernels, exposing the CVMs to ...