Secure processors have been recently introduced, which enable new applications involving software anti-piracy, program execution certification, and secure mobile agents. Secure processors have built-in hardware support for cryptographic mechanisms and can prevent both software attacks and physical attacks. Several recent papers have shown how to construct a secure processor to protect the confidentiality [1][2][3]and integrity[4][3] of a program. The proposed designs are immune from spoofing, splicing and replay attacks. However, none of the previous work is able to address the attacks due to information leakage on the address bus. Dangers due to information leakage on the address bus have been acknowledged to be an important as well as a d...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent v...
Secure processor architecture enables tamper-proof protec-tion on software that addresses many dicul...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of cod...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent v...
Secure processor architecture enables tamper-proof protec-tion on software that addresses many dicul...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of cod...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent v...
Secure processor architecture enables tamper-proof protec-tion on software that addresses many dicul...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...