Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilities that can be exploited by attackers to make programs misbehave. Many devices rely on software that needs security, such as medical implants, sensor networks, RFID tags, automotive controllers. Softwareshould do what it is asked to do, and should not misbehave by delivering the wrong drug dosages, by stealing information, by spying on the user, by disabling the brakes on a car, or by attacking other computers. The central topic of this thesis is the development of hardware-based mechanisms to prevent software from misbehaving. We focus on enhancing the security of microprocessors to detect runtime attacks, prevent malicious modification of so...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Security is a major concern in the computing systems with the increasing number of cyber attacks in ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrast...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
With a booming number of applications and end-users in the past decade, software security has been e...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Security is a major concern in the computing systems with the increasing number of cyber attacks in ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrast...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
With a booming number of applications and end-users in the past decade, software security has been e...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Security is a major concern in the computing systems with the increasing number of cyber attacks in ...