Speck 1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows sequential invocations of a particular security check to run in parallel without sacrificing the safety of the system. Speck creates parallelism in two ways. First, Speck decouples a security check from an application by continuing the application, using speculative execution, while the security check executes in parallel on another core. Second, Speck creates parallelism between sequential invocations of a security check by running later checks in parallel with earlier ones. Speck provides a process-level replay system to deterministically and efficiently synchroni...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The performance pressures on implementing effective network security monitoring are growing fiercely...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them...
With the advent of multicores, there is demand for monitoring parallelprograms running on multicores...
Over the past decades, the major objectives of computer design have been to improve performance and ...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
This research explores how hardware-based primitives can be implemented to perform security-related ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
The Intrusion Detection System (IDS) needs to compare the contents of all packets arriving at the ne...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
This paper qvplies parakl processing technology to abtabase security technology and vice versa. We f...
This artifact presents the implementation of SpecCheck, a gem5 extension for identifying potentially...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The performance pressures on implementing effective network security monitoring are growing fiercely...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them...
With the advent of multicores, there is demand for monitoring parallelprograms running on multicores...
Over the past decades, the major objectives of computer design have been to improve performance and ...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
This research explores how hardware-based primitives can be implemented to perform security-related ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
The Intrusion Detection System (IDS) needs to compare the contents of all packets arriving at the ne...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
This paper qvplies parakl processing technology to abtabase security technology and vice versa. We f...
This artifact presents the implementation of SpecCheck, a gem5 extension for identifying potentially...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The performance pressures on implementing effective network security monitoring are growing fiercely...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...