Systems security is becoming more challenging in the face of untrusted programs and system users. Safeguards against attacks currently in use, such as buffer overflows, control-flow integrity, side channels and malware, are limited. Software protection schemes, while flexible, are often too expensive, and hardware schemes, while fast, are too constrained or out-of-date to be practical. We demonstrate the best of both worlds with the Guardian Council, a novel parallel architecture to enforce a wide range of highly customisable and diverse security policies. We leverage heterogeneity and parallelism in the design of our system to perform security enforcement for a large high-performance core on a set of small microcontroller-sized cores. The...
The increasing need for security has caused system designers to consider placing some security suppo...
Computing systems are complex machines comprised of many disparate components working together to fu...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
This artefact contains the simulator, a sample benchmark, guardian kernels, and scripts to reproduce...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Abstract We describe Citadel, our vision of multi-layered defensivearchitectures that will augment e...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
The increasing need for security has caused system designers to consider placing some security suppo...
Computing systems are complex machines comprised of many disparate components working together to fu...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
This artefact contains the simulator, a sample benchmark, guardian kernels, and scripts to reproduce...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Abstract We describe Citadel, our vision of multi-layered defensivearchitectures that will augment e...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
The increasing need for security has caused system designers to consider placing some security suppo...
Computing systems are complex machines comprised of many disparate components working together to fu...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...