Tagged architectures have seen renewed interest as a means to improve the security and reliability of computing systems. Rich, programmable tag-based hardware security monitors like the PUMP allow software-defined security policies to benefit from hardware acceleration. The thesis of this work is that policies for programmable tagged architectures (1) can be engineered to enforce critical security properties at low cost, (2) can protect real programs running on real ISAs, and (3) can be applied automatically to programs—that is with compilation passes or automatic analysis—so that the benefits of such an architecture can be brought to existing and new software with minimal human intervention. To support this claim, I have constructed a rang...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
International audienceRecent advances in hardware design have demonstrated mechanisms allowing a wid...
Hardware-assisted reference monitoring is receiving increasing attention as a way to improve the sec...
Abstract—Recent advances in hardware design have demon-strated mechanisms allowing a wide range of l...
Abstract—Recent advances in hardware design have demon-strated mechanisms allowing a wide range of l...
International audienceHardware for propagating and checking software-programmable metadata tags can ...
International audienceHardware for propagating and checking software-programmable metadata tags can ...
Recent advances in hardware design have demonstrated mechanisms allowing a wide range of low-level s...
A tagged architecture is a system that applies tags on data, recently used in the field of informati...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
International audience ; Recent advances in hardware design have demonstrated mechanisms allowing a ...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
International audienceRecent advances in hardware design have demonstrated mechanisms allowing a wid...
Hardware-assisted reference monitoring is receiving increasing attention as a way to improve the sec...
Abstract—Recent advances in hardware design have demon-strated mechanisms allowing a wide range of l...
Abstract—Recent advances in hardware design have demon-strated mechanisms allowing a wide range of l...
International audienceHardware for propagating and checking software-programmable metadata tags can ...
International audienceHardware for propagating and checking software-programmable metadata tags can ...
Recent advances in hardware design have demonstrated mechanisms allowing a wide range of low-level s...
A tagged architecture is a system that applies tags on data, recently used in the field of informati...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
International audience ; Recent advances in hardware design have demonstrated mechanisms allowing a ...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...