Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022
1st Workshop on Data Integrity and Secure Cloud Computing (DISCC-2022)Pradip BoseJennifer Dworaket al.2022MICRO 2022
No More Turtles: The SecondaryVM Framework - An Alternative to Nested VirtualizationMengmei YeAngelo Ruocco2022KVM Forum 2022
AI-Assisted Controls Change Management for Cybersecurity in the CloudHarshal TupsamudreArun Kumaret al.2022IAAI 2022
Establishing Trust in Linux Keyrings - Is trust built-in, imputed, or transitive?Elaine PalmerGeorge Wilson2022LSS 2022
Privacy-preserving record linkage using local sensitive hash and private set intersectionAllon AdirEhud Aharoniet al.2022Cloud S&P 2022
A methodology for training homomorphic encryption friendly neural networksMoran BaruchNir Druckeret al.2022SiMLA 2022