Abstract is missing.
- Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be?Roberto Avanzi. 1 [doi]
- Intel HERACLES: Homomorphic Encryption Revolutionary Accelerator with Correctness for Learning-oriented End-to-End SolutionsRosario Cammarota. 3 [doi]
- Byzantine Fault Tolerance in the Age of Blockchains and Cloud ComputingHaibin Zhang. 5 [doi]
- Multi-Tenant Cloud FPGAs: Side-Channel Security and SafetyAydin Aysu. 7-8 [doi]
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion DetectionAsbat El Khairi, Marco Caselli, Christian Knierim, Andreas Peter, Andrea Continella. 9-21 [doi]
- Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) DatastoreSana Habib, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé. 23-39 [doi]
- A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic ManagementThomas Lorünser, Florian Wohner, Stephan Krenn. 41-51 [doi]
- On Matrix Multiplication with Homomorphic EncryptionPanagiotis Rizomiliotis, Aikaterini Triakosia. 53-61 [doi]
- Detecting Anomalous Misconfigurations in AWS Identity and Access Management PoliciesThijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella. 63-74 [doi]