This thesis explores architectural level optimizations to make secure systems more efficient, secure and affordable. It extends prior work for secure architecture in several areas. It proposes a new combined memory encryption and authentication scheme which uses very small on-chip storage area and incurs much less performance overhead compared with prior work. In addition, the thesis studies the issues of applying architectural support for data security to distributed shared memory systems. It presents a scheme which is scalable with large-scale systems and only introduces negligible performance overhead for confidentiality and integrity protection. Furthermore, the thesis also investigates another source of reducing performance overhead i...
A large part of our personal data, ranging from medical and financial records to our social activity...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
......Computer architects must bal-ance performance with all the other design aspects, including rel...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
In response to the continuous demand for the ability to process ever larger datasets, as well as dis...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Energy-efficiency and performance have been the driving forces of system architectures and designers...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Cluster computing has emerged as a common approach for providing more comput- ing and data resources...
A large part of our personal data, ranging from medical and financial records to our social activity...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
......Computer architects must bal-ance performance with all the other design aspects, including rel...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
In response to the continuous demand for the ability to process ever larger datasets, as well as dis...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Energy-efficiency and performance have been the driving forces of system architectures and designers...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Cluster computing has emerged as a common approach for providing more comput- ing and data resources...
A large part of our personal data, ranging from medical and financial records to our social activity...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
......Computer architects must bal-ance performance with all the other design aspects, including rel...