1,452 research outputs found

    SGXIO: Generic Trusted I/O Path for Intel SGX

    Full text link
    Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices. This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I/O devices. To achieve this, SGXIO combines the benefits of SGX's easy programming model with traditional hypervisor-based trusted path architectures. Moreover, SGXIO can tweak insecure debug enclaves to behave like secure production enclaves. SGXIO surpasses traditional use cases in cloud computing and makes SGX technology usable for protecting user-centric, local applications against kernel-level keyloggers and likewise. It is compatible to unmodified operating systems and works on a modern commodity notebook out of the box. Hence, SGXIO is particularly promising for the broad x86 community to which SGX is readily available.Comment: To appear in CODASPY'1

    Development Of An Information Technology Plan For A Virtual Enterprise Program At A Community College

    Get PDF
    This project proposed a technical solution to support the development of a Virtual Enterprise program at a community college. The college is located in a rural area that does not have large manufacturing or service-based businesses generating jobs. Consequently, many jobs are created by entrepreneurial endeavors. Traditional small start-ups are risky though. Many young people must leave the area to get better, higher-paying jobs. Individuals, especially students, need an opportunity to try out promising business ideas for practice, using a virtual global market on the Internet. A program of this type would provide valuable business experience to students from all vocational disciplines, enhancing their preparation for employment. The community might retain more of its talented people, and benefit from further economic growth. To encourage entrepreneurial endeavors in the community, the goal of this project was to develop a plan that details the technical and classroom resources as well as the activities necessary to implement a Virtual Enterprise program at the community college. The plan would discuss requirements for the facility, personnel, servers, workstations, local area network, Internet access, software, projectors, multimedia classroom equipment, fax machines, and furniture. The plan would address the various needs of the multiple stakeholders. The Virtual Enterprise facility would simulate an office environment where students have office space and equipment. According to the Marion Kauffman Foundation (Kauffman, 2001), entrepreneurial studies is one of the fastest growing fields of study in the business administration discipline with over 1500 programs currently being offered at four-year Virtual Enterprise IT Plan 6 colleges in the United States. The national trend indicating increased interest in entrepreneurial education is clearly evident in the local community as well. A recent business plan competition funded by a wealthy businessman who owns both local and national businesses was well received by the local community, with over 200 applicants attending the first kick-off meeting. The Virtual Enterprise program and facility is envisioned to support community college students, high school technical preparation programs, and the local community

    Spartan Daily, October 31, 2000

    Get PDF
    Volume 115, Issue 43https://scholarworks.sjsu.edu/spartandaily/9610/thumbnail.jp

    Leicester Research A Study in Effective Technology in Education

    Get PDF
    The LPS Research Team has been tasked with researching and recommending a technology plan for a new school that Leicester Public Schools is planning to build. In this paper, we present an overview of the our goals and our client’s goals, an introduction to industry trends, and discuss our findings based on research conducted via interviews with schools that have undergone similar projects. We also outline the conclusions drawn from this research and our analysis of the data we uncovered, and make specific recommendations for technology to be utilized in Leicester’s new school. Finally, we present a 3-part framework that Leicester Public Schools can use to refresh this data as needed, for this or future educational technology endeavors

    NASA/ESA CT-990 Spacelab simulation. Appendix A: The experiment operator

    Get PDF
    A joint NASA/ESA endeavor was established to conduct an extensive spacelab simulation using the NASA CV-990 airborne laboratory. The scientific payload was selected to perform studies in upper atmospheric physics and infrared astronomy with principal investigators from France, the Netherlands, England, and several groups from the United States. Two experiment operators from Europe and two from the U.S. were selected to live aboard the aircraft along with a mission manager for a six-day period and operate the experiments in behalf of the principal scientists. This appendix discusses the experiment operators and their relationship to the joint mission under the following general headings: selection criteria, training programs, and performance. The performance of the proxy operators was assessed in terms of adequacy of training, amount of scientific data obtained, quality of data obtained, and reactions to problems that arose in experiment operation

    Strait, v.1, no. 12, 1972-04-19

    Get PDF
    https://digitalcommons.buffalostate.edu/strait/1003/thumbnail.jp

    Obiter Dicta

    Get PDF
    "Stitched together over five years of journaling, Obiter Dicta is a commonplace book of freewheeling explorations representing the transcription of a dozen notebooks, since painstakingly reimagined for publication. Organized after Theodor Adorno’s Minima Moralia, this unschooled exercise in aesthetic thought—gleefully dilettantish, oftentimes dangerously close to the epigrammatic—interrogates an array of subject matter (although inescapably circling back to the curiously resemblant histories of Western visual art and instrumental music) through the lens of drive-by speculation. Erick Verran’s approach to philosophical inquiry follows the brute-force literary technique of Jacques Derrida to exhaustively favor the material grammar of a signifier over hand-me-down meaning, juxtaposing outer semblances with their buried systems and our etched-in-stone intuitions about color and illusion, shape and value, with lessons stolen from seemingly unrelatable disciplines. Interlarded with extracts of Ludwig Wittgenstein but also Wallace Stevens, Cormac McCarthy as well as Roland Barthes, this cache of incidental remarks eschews what’s granular for the biggest picture available, leaving below the hyper-specialized fields of academia for a bird’s-eye view of their crop circles. Obiter Dicta is an unapologetic experiment in intellectual dot-connecting that challenges much long-standing wisdom about everything from illuminated manuscripts to Minecraft and the evolution of European music with lyrical brevity; that is, before jumping to the next topic.

    Professional English for the students of Electronic Education Institute in specialty of «Informatics and Computer Technologies»

    Get PDF
    Пособие предназначено для студентов 3 курса ИнЭО, изучающих профессиональный курс английского языка по направлению 09.03.01 «Информатика и вычислительная техника»

    Computer forensics methodology and praxis.

    Get PDF
    This thesis lays the groundwork for creation of a graduate-level computer forensics course. It begins with an introduction explaining how computing has invaded modern life and explains what computer forensics is and its necessity. The thesis then argues why universities need to be at the forefront of educating students in the science of computer forensics as opposed to proprietary education courses and the benefits to law enforcement agencies of having a computer scientist perform forensic analyses. It continues to detail what computer forensics is and is not. The thesis then addresses legal issues and the motivation for the topic. Following this section is a review of current literature pertaining to the topic. The last half of the thesis lays a groundwork for design of a computer forensics course at the graduate level by detailing a methodology to implement which contains associated laboratory praxis for the students to follow
    corecore