307 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.The key insight in this dissertation is that certain data in the program is more important than other data from a reliability or security point of view (we call this the critical data). Protecting only the critical data provides significant performance improvements while achieving high detection coverage. The technique derives error and attack detectors to detect corruptions of critical data at runtime using a combination of static and dynamic approaches. The derived detectors are validated using both experimental approaches and formal verification. The experimental approaches validate the detectors using random fault-injection and known security attacks. The formal appr...
Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Science Foun...
112 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.This dissertation is focused ...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
This paper presents a technique to derive and implement error detectors to protect an application fr...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Extensive reliability-based research including [2, 8, 10] has shown that software metrics can be use...
Modern computer systems are plagued with security flaws, making them vulnerable to various malicious...
Cyber attacks against networked computers have become relentless in recent years. The most common at...
119 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.In the end, this dissertation...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
Various vulnerabilities in software applications become easy targets for attackers. The trend consta...
Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Science Foun...
112 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.This dissertation is focused ...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
This paper presents a technique to derive and implement error detectors to protect an application fr...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Extensive reliability-based research including [2, 8, 10] has shown that software metrics can be use...
Modern computer systems are plagued with security flaws, making them vulnerable to various malicious...
Cyber attacks against networked computers have become relentless in recent years. The most common at...
119 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.In the end, this dissertation...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
Various vulnerabilities in software applications become easy targets for attackers. The trend consta...
Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Science Foun...
112 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.This dissertation is focused ...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...