Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.Includes bibliographical references (p. 129-135).Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and security of computer systems, but will be adopted only if the protection mechanism does not compromise performance, and if the hardware mechanism can be used easily by existing software. Mondriaan memory protection (MMP) provides fine-grained memory protection for a linear address space, while supporting an efficient hardware implementation. MMP's use of linear a...
There is a misconception in much of the operating systems community that hardware mechanisms are the...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
There is a misconception in much of the operating systems community that hardware mechanisms are the...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
There is a misconception in much of the operating systems community that hardware mechanisms are the...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...