CHORS: hardening high-assurance security systems with trusted computing

CHORS: hardening high-assurance security systems with trusted computing

Conference paper
06 May 2022
This paper presents and formally proves a novel defense against the cuckoo attack.
A Randomized Greedy Method for AI Applications Component Placement and Resource Selection in Computing

A Randomized Greedy Method for AI Applications Component Placement and Resource Selection in Computing Continua

Conference paper
13 October 2021
This paper explains how efficient component placement and resource allocation algorithms are crucial to orchestrate at best the computing continuum resources.
Colony: Parallel Functions as a Service on the Cloud-Edge Continuum

Colony: Parallel Functions as a Service on the Cloud-Edge Continuum

Conference paper
01 September 2021
This paper proposes a solution to organise the devices within the Cloud-Edge Continuum in such a way that each one, as an autonomous individual –Agent–, processes events/data on its embedded compute resources while offering its computing capacity to the rest of the infrastructure in a Function-as-a-Service manner.
ADAM-CS - Advanced Asynchronous Monotonic Counter Service

ADAM-CS - Advanced Asynchronous Monotonic Counter Service

Conference paper
06 August 2021
ADAM-CS is an asynchronous monotonic counter service to protect such high-traffic applications against rollback attacks. Leveraging a set of distributed monotonic counters and specific algorithms, ADAM-CS minimizes the maximum vulnerability window (MVW), i.e., the amount of transactions an adversary could successfully rollback.
Pareto-Optimal Progressive Neural Architecture Search

Pareto-Optimal Progressive Neural Architecture Search

Conference paper
14 July 2021
This paper presents the Neural Architecture Search (NAS): the process of automating architecture engineering, searching for the best deep learning configuration.
A Datalog Hammer for Supervisor Verification Conditions Modulo Simple Linear Arithmetic

A Datalog Hammer for Supervisor Verification Conditions Modulo Simple Linear Arithmetic

Conference paper
08 July 2021
In this paper, the authors prove that BS(SLR) clause sets with both universally and existentially quantified verification conditions (conjectures) can be translated into BS(SLR) clause sets over a finite set of first-order constants.
Advancing Design and Runtime Management of AI Applications with AI-SPRINT. Applications, Challenges & Concerns)

Advancing Design and Runtime Management of AI Applications with AI-SPRINT: Applications, Challenges & Concerns

Conference paper
04 June 2021
This papers presents the AI-SPRINT project that offers novel tools for AI applications development, secure  execution, easy deployment, as well as runtime management and optimisation.
Formal Foundations for Intel SGX Data Center Attestation Primitives

Formal Foundations for Intel SGX Data Center Attestation Primitives

Conference paper
19 December 2020
Intel has recently offered third-party attestation services, called Data Center Attestation Primitives (DCAP), for a data center to create its own attestation infrastructure. These services address the availability concerns and improve the performance as compared to the remote attestation based on Enhanced Privacy ID (EPID).