Presented on February 7, 2020 at 12:00 p.m. in the CODA building, 9th floor block atrium.Michael D. Brown is a Research Scientist at the Georgia Tech Research Institute (GTRI) and a doctoral student at the Georgia Institute of Technology. Michael's primary research interest is the development of software transformation techniques to improve the security of computing systems.Runtime: 50:14 minutesThe security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations have been shown to introduce security weaknesses into programs despite maintaining the semantic correctness of the corresponding source code. These weaknes...
As systems become more complex, there are increasing demands for improvement with respect to attribu...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Presented on March 8, 2019 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116.Shelby ...
Abstract—There is a significant body of work devoted to testing, verifying, and certifying the corre...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Hunting binary code difference without source code (i.e., binary diffing) has compelling application...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Cavazos, JohnThe number of optimizations that are available in modern day compilers are in their hun...
The strict power efficiency constraints required to achieve exascale systems will dramatically incre...
In this work, we present several compiler optimizations to reduce the overhead due to software prote...
There is implicit trust involved when using computer software. Open-source software attempts to insp...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
The pursuit of secure computation has always featured a tension between performance and security. Se...
The pursuit of secure computation has always featured a tension between performance and security. Se...
As systems become more complex, there are increasing demands for improvement with respect to attribu...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Presented on March 8, 2019 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116.Shelby ...
Abstract—There is a significant body of work devoted to testing, verifying, and certifying the corre...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Hunting binary code difference without source code (i.e., binary diffing) has compelling application...
Software is pervasive in our daily lives and we rely on it for many critical tasks. Despite the abun...
Cavazos, JohnThe number of optimizations that are available in modern day compilers are in their hun...
The strict power efficiency constraints required to achieve exascale systems will dramatically incre...
In this work, we present several compiler optimizations to reduce the overhead due to software prote...
There is implicit trust involved when using computer software. Open-source software attempts to insp...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
The pursuit of secure computation has always featured a tension between performance and security. Se...
The pursuit of secure computation has always featured a tension between performance and security. Se...
As systems become more complex, there are increasing demands for improvement with respect to attribu...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Presented on March 8, 2019 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116.Shelby ...