Today's computing devices keep considerable amounts of sensitive data unencrypted in RAM. When stolen, lost or simply unattended, attackers are capable of accessing the data in RAM with ease. Valuable and possibly classified data falling into the wrongs hands can lead to severe consequences, for instance when disclosed or reused to log in to accounts or to make transactions. We present a lightweight and hardware-independent mechanism to protect confidential data on suspended Linux devices against physical attackers. Our mechanism rapidly encrypts the contents of RAM during suspension and thereby prevents attackers from retrieving confidential data from the device. Existing systems can easily be extended with our mechanism while fully preser...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems an...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems an...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...