Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to achieving persistent data privacy and computing security, both of which are critically important to the embedded and IoT applications. Specifically, to successfully restore NVMs to their working states after unexpected system crashes or power failure, maintaining and recovering all the necessary security-related metadata can severely increase memory traffic, degrade runtime performance, exacerbate write endurance problem, and demand costly hardware changes to off-the-shelf processors. In this thesis, we summarize and expand upon two of our innovative works, ARES and HERMES, t...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Energy-efficiency and performance have been the driving forces of system architectures and designers...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
The rapid growth of memory-intensive applications like cloud computing, deep learning, bioinformatic...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Nowadays, special purpose embedded system design relies on the availability of the hardware configur...
Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrast...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
With the increased usage of embedded computers in modern life and the rapid growth of the Internet o...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Energy-efficiency and performance have been the driving forces of system architectures and designers...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
The rapid growth of memory-intensive applications like cloud computing, deep learning, bioinformatic...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Nowadays, special purpose embedded system design relies on the availability of the hardware configur...
Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrast...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
With the increased usage of embedded computers in modern life and the rapid growth of the Internet o...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...