research
          
      
      ∙
      10/11/2022
    Software Supply Chain Attribute Integrity (SCAI)
The Software Supply Chain Attribute Integrity, or SCAI (pronounced "sky"...
          
            research
          
      
      ∙
      09/08/2022
    What is Software Supply Chain Security?
The software supply chain involves a multitude of tools and processes th...
          
            research
          
      
      ∙
      06/17/2021
    Hardware-Enforced Integrity and Provenance for Distributed Code Deployments
Deployed microservices must adhere to a multitude of application-level s...
          
            research
          
      
      ∙
      06/17/2021
    Enabling Security-Oriented Orchestration of Microservices
As cloud providers push multi-tenancy to new levels to meet growing scal...
          
            research
          
      
      ∙
      07/30/2019
    EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments
Trusted executions environments (TEEs) such as Intel(R) SGX provide hard...
          
            research
          
      
      ∙
      03/05/2019
    Pyronia: Intra-Process Access Control for IoT Applications
Third-party code plays a critical role in IoT applications, which genera...
          
            research
          
      
      ∙
      03/05/2019
     
             
  
  
     
                             
                             share
 share