Consumer devices are increasingly being used to perform security and privacy critical tasks. The software used to perform these tasks is often vulnerable to attacks, due to bugs in the application itself or in included software libraries. Recent work proposes the isolation of security-sensitive parts of applications into protected modules, each of which can only be accessed through a predefined public interface. But most parts of an application can be considered security-sensitive at some level, and an attacker that is able to gain in-application level access may be able to abuse services from protected modules. We propose Salus, a Linux kernel modification that provides a novel approach for partitioning processes into isolated compartment...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Inside cyber security threats by system administrators are some of the main concerns of organization...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
As network, I/O, accelerator, and NVM devices capable of a million operations per second make their ...
open access articleToday, Linux users use sudo/su commands to attribute Linux’s administrative privi...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Inside cyber security threats by system administrators are some of the main concerns of organization...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
As network, I/O, accelerator, and NVM devices capable of a million operations per second make their ...
open access articleToday, Linux users use sudo/su commands to attribute Linux’s administrative privi...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...