This thesis presents an architectural solution that provides secure and reliable execution of an application that computes critical data, in spite of potential hardware and software vulnerabilities. The technique does not require source code of or specifications about the malicious library function(s) called during execution of an application. The solution is based on the concept of Information Flow Signatures (IFS). The technique uses both a model-checker-based symbolic fault injection analysis tool called SymPLFIED to generate an IFS for an application or operating system, and runtime signature checking at the level of hardware to protect the integrity of critical data. The runtime checking is implemented in the IFS module. Reliable compu...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceComputing devices became part of our daily world. But being physically accessi...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceComputing devices became part of our daily world. But being physically accessi...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceComputing devices became part of our daily world. But being physically accessi...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...