With reference to an embedded system featuring no support for memory management, we present a model of a protection system based on passwords. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU supports both concepts of a protection context and a protection domain. A protection context is a set of access rights for the memory pages; a protection domain is a set of one or more protection contexts. Passwords are associated with protection domains. A process that holds a given password can take advantage of this password to activate the corresponding domain. A small set of protection primitives makes it poss...
Abstract A single address space operating system is an excellent environment for the im-plementation...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
With reference to an embedded system featuring no support for memory management, we present a model ...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
This dissertation explores the use of capability security hardware and software in real-time and lat...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
The challenges faced in securing embedded computing systems against multifaceted memory safety vulne...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
We consider the problem of access privilege management in a classical protection environment featuri...
We consider a single-address-space system which implements a form of segmentation with paging within...
With reference to a classic protection system featuring active subjects that reference protected obj...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract A single address space operating system is an excellent environment for the im-plementation...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
With reference to an embedded system featuring no support for memory management, we present a model ...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
This dissertation explores the use of capability security hardware and software in real-time and lat...
With reference to the typical hardware configuration of a sensor node, we present the architecture o...
The challenges faced in securing embedded computing systems against multifaceted memory safety vulne...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Aside from malicious software gaining access and corrupting sections of computer memory, even legiti...
We consider the problem of access privilege management in a classical protection environment featuri...
We consider a single-address-space system which implements a form of segmentation with paging within...
With reference to a classic protection system featuring active subjects that reference protected obj...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract A single address space operating system is an excellent environment for the im-plementation...
Accidental overwriting of files or of memory regions belonging to other programs, browsing of person...
With reference to a distributed system consisting of nodes connected by a local area network, we con...