Proceedings of the 12th ACM International Conference on Systems and Storage 2019
DOI: 10.1145/3319647.3325835
|View full text |Cite
|
Sign up to set email alerts
|

Clemmys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Clemmys [60] provides a framework for running serverless functions in SGX enclaves. The functions are run inside a SCONE-based environment [22], that supports unmodified POSIX binaries.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Clemmys [60] provides a framework for running serverless functions in SGX enclaves. The functions are run inside a SCONE-based environment [22], that supports unmodified POSIX binaries.…”
Section: Related Workmentioning
confidence: 99%
“…This allows TAPDance to keep a relatively low software trusted computing base involving a TLS library and a customized userspace runtime to service applet library functionality needs. In general, serverless frameworks that use TEEs have large runtimes relative to TAPDance because they are designed to support general computations instead of pure computations [20], [27], [54], [60] Komodo [39] decouples the enclave memory management from the hardware, in contrast to SGX. The memory management is delegated to a formally verified software monitor that runs in the ARM secure mode.…”
Section: Related Workmentioning
confidence: 99%
“…The adoption of specialised hardware for security in Cloud scenarios is largely diffused [17][18][19][20][21] to address the issue to entrust applications and their data to Cloud providers. The two main technologies adopted are TEEs and enclaves, which share the idea to reserve a separate and protected region of memory for executing code that is not accessible or temperable by the owner of the machine by enabling secure data processing.…”
Section: Related Work 21 Specialised Hardware For Cloud Securitymentioning
confidence: 99%
“…show that secret data transfer between functions can take up to 34.7% of the execution time [94]. Although recent studies [96,97,98] propose different software-based optimization techniques, the end-to-end latency to invoke a function is nowhere close to the satisfactory range. Li et al conclude that the design technology of the current SGX is the reason for the high latency overhead.…”
Section: Confidential Computing In the Serverless Cloud Paradigmmentioning
confidence: 99%