With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We present a hardware-based approach to improve the resilience of a computer system against the erro...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
Since sensors do not have a sophisticated hardware archi-tecture or an operating system to manage co...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
ManuscriptReliable sensor network software is difficult to create: applications are concurrent and d...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
ManuscriptWe report our experience in implementing type and memory safety in an efficient manner for...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Many embedded processing applications, such as those found in the automotive or medical field, requi...
For embedded systems, where neither energy nor reliability can be easily sacrificed, this paper pres...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Register File (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes ...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We present a hardware-based approach to improve the resilience of a computer system against the erro...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
Since sensors do not have a sophisticated hardware archi-tecture or an operating system to manage co...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
ManuscriptReliable sensor network software is difficult to create: applications are concurrent and d...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
ManuscriptWe report our experience in implementing type and memory safety in an efficient manner for...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Many embedded processing applications, such as those found in the automotive or medical field, requi...
For embedded systems, where neither energy nor reliability can be easily sacrificed, this paper pres...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Register File (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes ...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We present a hardware-based approach to improve the resilience of a computer system against the erro...