Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3007788.3007798acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
short-paper

Protecting Password Databases using Trusted Hardware

Published: 12 December 2016 Publication History

Abstract

No abstract available.

References

[1]
Intel Software Guard Extensions SDK Developer Reference for Linux OS. 2016.
[2]
I. Anati et al. Innovative Technology for CPU Based Attestation and Sealing. In Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
[3]
J. Birr-Pixton. Using SGX to harden password hashing. https://jbp.io/2016/01/17/using-sgx-to-hash-passwords, 2016.
[4]
J. Bonneau. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, 2012.
[5]
D. Cvrcek. Hardware Scrambling - No More Password Leaks. https://www.lightbluetouchpaper.org/2014/03/07/hardware-scrambling-no-more-password-leaks.
[6]
A. Everspaugh et al. The Pythia PRF Service. In USENIX Security Symposium, 2015.

Cited By

View all
  • (2018)SafeKeeperProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186101(349-358)Online publication date: 10-Apr-2018
  • (2018)Secure data processing for IoT middleware systemsThe Journal of Supercomputing10.1007/s11227-018-2686-xOnline publication date: 14-Nov-2018
  • (2017)TrustJSProceedings of the 10th European Workshop on Systems Security10.1145/3065913.3065917(1-6)Online publication date: 23-Apr-2017
  • Show More Cited By
  1. Protecting Password Databases using Trusted Hardware

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SysTEX '16: Proceedings of the 1st Workshop on System Software for Trusted Execution
    December 2016
    54 pages
    ISBN:9781450346702
    DOI:10.1145/3007788
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 December 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Intel SGX
    2. password databases
    3. web authentication

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    Middleware '16
    Sponsor:
    • ACM
    • USENIX Assoc

    Upcoming Conference

    EuroSys '25
    Twentieth European Conference on Computer Systems
    March 30 - April 3, 2025
    Rotterdam , Netherlands

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)SafeKeeperProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186101(349-358)Online publication date: 10-Apr-2018
    • (2018)Secure data processing for IoT middleware systemsThe Journal of Supercomputing10.1007/s11227-018-2686-xOnline publication date: 14-Nov-2018
    • (2017)TrustJSProceedings of the 10th European Workshop on Systems Security10.1145/3065913.3065917(1-6)Online publication date: 23-Apr-2017
    • (2017)SGX-LogProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053034(19-30)Online publication date: 2-Apr-2017

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media