Software bugs in many different variants can potentially leak sensitive data to an attacker. Implementing a separation mechanism for security domains can prevent incorrect or malicious code to leak sensitive data from one security domain to another. This work presents a separation mechanism based on labeling security domains with a label in tagged memory, at word-level granularity, called color labeling.Utilizing a tagged architecture based on the RISC-V architecture, color labeling assigns colors (denoting a security domain) to individual memory words, cache lines, registers and peripherals. Using a simple set of hardware enforced policies, data protection is ensured. Control flow integrity is maintained with thehelp of additional tag bits...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
Rust is a programming language that simultaneously offers high performance and strong security guara...
This dissertation is a continuation of an Air Force Research Laboratory (AFRL) project focused on th...
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized reads...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis is a part of an Air Force Research Laboratory (AFRL) project focused on developing a fra...
Commodity processor architectures are releasing various instruction set extensions to support securi...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
Embedded computer systems are an invisible, ever-growing part of our lives. Through market trends, l...
Modern RISC processors are based on a load/store architecture, where all computations are performed ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
Many attacks on modern software begin when the application processes untrusted data. Often attackers...
Rust is a programming language that simultaneously offers high performance and strong security guara...
This dissertation is a continuation of an Air Force Research Laboratory (AFRL) project focused on th...
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized reads...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
This thesis is a part of an Air Force Research Laboratory (AFRL) project focused on developing a fra...
Commodity processor architectures are releasing various instruction set extensions to support securi...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
Embedded computer systems are an invisible, ever-growing part of our lives. Through market trends, l...
Modern RISC processors are based on a load/store architecture, where all computations are performed ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...