Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality — deliberately introduced Trojan horses or accidentally introduced bugs — in any component of a system can be exploited by attackers to exert control over the system. This poses a serious security risk to systems — especially in the ever growing number of systems based on networks of computers. The approach adopted in this dissertation to secure systems seeks immunity from hidden functionality. Specifcally, if a minimal trusted computing base (TCB) for any system can be identifed, and if we can eliminate hidden functionality in the TCB, all desired assurances regarding the operation of the system can be guaranteed....
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory d...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The operating system kernel serves as the root of trust for all applications running on the computer...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
The operating system kernel security is critical for the overall system reliability, since the kerne...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory d...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
The security of a computer system hinges on the trustworthiness of the operating system and the hard...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The operating system kernel serves as the root of trust for all applications running on the computer...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
The operating system kernel security is critical for the overall system reliability, since the kerne...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory d...