Today’s complex software systems are neither secure nor reliable. The rudimentary software protection primitives pro-vided by current hardware forces systems to run many distrust-ing software components (e.g., procedures, libraries, plugins, modules) in the same protection domain, or otherwise suffer degraded performance from address space switches. We present CODOMs (COde-centric memory DOMains), a novel architecture that can provide finer-grained isolation between software components with effectively zero run-time overhead, all at a fraction of the complexity of other ap-proaches. An implementation of CODOMs in a cycle-accurate full-system x86 simulator demonstrates that with the right hardware support, finer-grained protection and run-ti...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Today's complex software systems are neither secure nor reliable. The rudimentary software protectio...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Abstract A single address space operating system is an excellent environment for the im-plementation...
The need to secure software systems is more important than ever. However, while a lot of work exists...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
In this paper, we advocate for a general-purpose, fine-grain memory protection mechanism for use by ...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 2011.Computer architects have e...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Today's complex software systems are neither secure nor reliable. The rudimentary software protectio...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Abstract A single address space operating system is an excellent environment for the im-plementation...
The need to secure software systems is more important than ever. However, while a lot of work exists...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
In this paper, we advocate for a general-purpose, fine-grain memory protection mechanism for use by ...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 2011.Computer architects have e...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...