Computer security and privacy are becoming extremely important nowadays. The task of protecting computer systems from malicious attacks and potential subsequent catastrophic losses is, however, challenged by the ever increasing complexity and size of modern hardware and software design. We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as performance efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes to protect the privacy of an emerging non-volatile main me...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Secure processors have been recently introduced, which enable new applications involving software an...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Phase change memory (PCM) is a promising technology for computer memory systems. However, the non-vo...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Phase change memory (PCM) technology appears as more scalable than DRAM technology. As PCM exhibits ...
International audiencePhase change memory (PCM) technology appears as more scalable than DRAM techno...
Privacy protection is an essential part of information security. The use of shared resources demands...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Secure processors have been recently introduced, which enable new applications involving software an...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Phase change memory (PCM) is a promising technology for computer memory systems. However, the non-vo...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Phase change memory (PCM) technology appears as more scalable than DRAM technology. As PCM exhibits ...
International audiencePhase change memory (PCM) technology appears as more scalable than DRAM techno...
Privacy protection is an essential part of information security. The use of shared resources demands...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Secure processors have been recently introduced, which enable new applications involving software an...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...