Consumer devices are increasingly being used to perform security and privacy critical tasks. The software used to perform these tasks is often vulnerable to attacks, due to bugs in the application itself or in included software libraries. Recent work proposes the isolation of security-sensitive parts of applications into protected modules, each of which can be accessed only through a predefined public interface. But most parts of an application can be considered security-sensitive at some level, and an attacker who is able to gain in-application level access may be able to abuse services from protected modules. We propose Salus, a Linux kernel modification that provides a novel approach for partitioning processes into isolated compartments...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
textCommodity computer systems today do not provide system support for privacy. As a result, given ...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Modern applications often involve processing of sensitive information. However, the lack of privileg...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Sting applications often contain security holes that are not patched until after the system has alre...
Intra-process memory isolation can improve security by enforcing least-privilege at a finer granular...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
textCommodity computer systems today do not provide system support for privacy. As a result, given ...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Modern applications often involve processing of sensitive information. However, the lack of privileg...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Sting applications often contain security holes that are not patched until after the system has alre...
Intra-process memory isolation can improve security by enforcing least-privilege at a finer granular...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
This thesis presents the design, implementation, and evaluation of a novel capability operating syst...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
textCommodity computer systems today do not provide system support for privacy. As a result, given ...