Skip to main content

Showing 1–10 of 10 results for author: Kapitza, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.08256  [pdf, other

    cs.CR cs.DC

    SoK: A cloudy view on trust relationships of CVMs -- How Confidential Virtual Machines are falling short in Public Cloud

    Authors: Jana Eisoldt, Anna Galanou, Andrey Ruzhanskiy, Nils Küchenmeister, Yewgenij Baburkin, Tianxiang Dai, Ivan Gudymenko, Stefan Köpsell, Rüdiger Kapitza

    Abstract: Confidential computing in the public cloud intends to safeguard workload privacy while outsourcing infrastructure management to a cloud provider. This is achieved by executing customer workloads within so called Trusted Execution Environments (TEEs), such as Confidential Virtual Machines (CVMs), which protect them from unauthorized access by cloud administrators and privileged system software. At… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

  2. VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions

    Authors: Luis Gerhorst, Henriette Herzog, Peter Wägemann, Maximilian Ott, Rüdiger Kapitza, Timo Hönig

    Abstract: High-performance IO demands low-overhead communication between user- and kernel space. This demand can no longer be fulfilled by traditional system calls. Linux's extended Berkeley Packet Filter (BPF) avoids user-/kernel transitions by just-in-time compiling user-provided bytecode and executing it in kernel mode with near-native speed. To still isolate BPF programs from the kernel, they are static… ▽ More

    Submitted 8 January, 2025; v1 submitted 30 April, 2024; originally announced May 2024.

    Comments: RAID'24

    MSC Class: 68M25 ACM Class: D.4.6

  3. arXiv:2402.15277  [pdf, other

    cs.CR cs.DC

    Trustworthy confidential virtual machines for the masses

    Authors: Anna Galanou, Khushboo Bindlish, Luca Preibsch, Yvonne-Anne Pignolet, Christof Fetzer, Rüdiger Kapitza

    Abstract: Confidential computing alleviates the concerns of distrustful customers by removing the cloud provider from their trusted computing base and resolves their disincentive to migrate their workloads to the cloud. This is facilitated by new hardware extensions, like AMD's SEV Secure Nested Paging (SEV-SNP), which can run a whole virtual machine with confidentiality and integrity protection against a p… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  4. arXiv:2312.05714  [pdf, other

    cs.DC cs.CR

    Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols

    Authors: Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves-Verissimo, Jiangshan Yu

    Abstract: A recent paper by Gupta et al. (EuroSys'23) challenged the usefulness of trusted component (TC) based Byzantine fault-tolerant (BFT) protocols to lower the replica group size from $3f+1$ to $2f+1$, identifying three limitations of such protocols and proposing that TCs should be used instead to improve the performance of BFT protocols. Here, we point out flaws in both arguments and advocate that th… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  5. arXiv:2303.11045  [pdf, other

    cs.DC

    SoK: Scalability Techniques for BFT Consensus

    Authors: Christian Berger, Signe Schwarz-Rüsch, Arne Vogel, Kai Bleeke, Leander Jehl, Hans P. Reiser, Rüdiger Kapitza

    Abstract: With the advancement of blockchain systems, many recent research works have proposed distributed ledger technology~(DLT) that employs Byzantine fault-tolerant~(BFT) consensus protocols to decide which block to append next to the ledger. Notably, BFT consensus can offer high performance, energy efficiency, and provable correctness properties, and it is thus considered a promising building block for… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 18 pages, accepted to appear in the proceedings of the 5th IEEE International Conference on Blockchain and Cryptocurrency

    ACM Class: A.1; C.2

  6. arXiv:2205.08938  [pdf, other

    cs.DC

    SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

    Authors: Ines Messadi, Markus Horst Becker, Kai Bleeke, Leander Jehl, Sonia Ben Mokhtar, Rüdiger Kapitza

    Abstract: Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas. Due to their high throughput and finality property BFT algorithms build the core of recent permissioned blockchains. As a complex and resource-demanding infrastructure, multiple cloud providers have started offering Blockchain-as-a-Service. This eases the deployme… ▽ More

    Submitted 24 May, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

  7. arXiv:2010.09512  [pdf, other

    cs.CR

    Hector: Using Untrusted Browsers to Provision Web Applications

    Authors: David Goltzsche, Tim Siebels, Lennard Golsch, Rüdiger Kapitza

    Abstract: Web applications are on the rise and rapidly evolve into more and more mature replacements for their native counterparts. This disruptive trend is mainly driven by the attainment of platform-independence and instant deployability. On top of this, web browsers offer the opportunity for seamless browser-to-browser communication for distributed interaction. In this paper, we present Hector, a novel… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  8. arXiv:1805.08541  [pdf, other

    cs.DC cs.CR

    Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric

    Authors: Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti

    Abstract: A smart contract on a blockchain cannot keep a secret because its data is replicated on all nodes in a network. To remedy this problem, it has been suggested to combine blockchains with trusted execution environments (TEEs), such as Intel SGX, for executing applications that demand privacy. Untrusted blockchain nodes cannot get access to the data and computations inside the TEE. This paper first… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

  9. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

    Authors: Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, Rüdiger Kapitza, Marcelo Pasin, Valerio Schiavoni

    Abstract: By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a n… ▽ More

    Submitted 27 July, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

    Journal ref: 38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018)

  10. arXiv:1701.00981  [pdf, other

    cs.DC

    Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory

    Authors: Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza

    Abstract: Novel hardware-aided trusted execution environments, as provided by Intel's Software Guard Extensions (SGX), enable to execute applications in a secure context that enforces confidentiality and integrity of the application state even when the host system is misbehaving. While this paves the way towards secure and trustworthy cloud computing, essential system support to protect persistent applicati… ▽ More

    Submitted 19 June, 2017; v1 submitted 4 January, 2017; originally announced January 2017.

    Comments: This is the authors' version of an article published in the Proceedings of the 47th International Conference on Dependable Systems and Networks (DSN'17), Denver, USA, 26-29 June 2017