Abstract — Memory scanning is a common technique used by malicious programs to read and modify the memory of other programs. Guarding programs against such exploits requires memory encryption, which is presently achievable either by (i) re-writing software to make it encrypt sensitive memory contents, or (ii) employing hardware-based solutions. These approaches are complicated, costly, and present their own vulnerabilities. In this paper, we describe new secure software technology that enables users to transparently add memory encryption to their existing software, without requiring users to invest in costly encryption hardware or requiring programmers to undertake complicated software redesign/redeployment. The Memory Encryption and Transp...
The amount of digital data generated and stored by users increases every day. In order to protect th...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
ENGELSK: Memory sticks have increased their storage capacity while the price have decreased. Memory ...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. I...
Increases in data production and growing demands for more computing power leads to the current trend...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
The amount of digital data generated and stored by users increases every day. In order to protect th...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...
ENGELSK: Memory sticks have increased their storage capacity while the price have decreased. Memory ...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. I...
Increases in data production and growing demands for more computing power leads to the current trend...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
The amount of digital data generated and stored by users increases every day. In order to protect th...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
With the recent popularity of outsourcing private data to the cloud, there is an increased interest ...