The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. At the same time, our devices – for instance mobile phones and TVs – have become more complex, connected, and open for the execution of third-party software. Operating systems should separate untrusted software from confidential data and critical services. But their vulnerabilities often allow malware to break the separation and isolation they are designed to provide. To strengthen protection of select assets, security research has started to create complementary machinery such as security hypervisors and separation kernels...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
The computing landscape has significantly changed over the last decades. The devices we use today to...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Any modern automotive embedded information system is likely to be connected to the Internet, providi...
With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs ...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
The computing landscape has significantly changed over the last decades. The devices we use today to...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
Many embedded systems have relatively strong security requirements because they handle confidential ...
Any modern automotive embedded information system is likely to be connected to the Internet, providi...
With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs ...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...