Secure and reliable computing remains an open problem. Just in the past year, security vulnerabilities continued to be discovered in widely-used applications, and remote attacks that take advantage of these vulnerabilities can cause an enormous amount of damage. Runtime monitoring is a promising approach for addressing a wide range of security and reliability problems in a general and transparent fashion. However, software-only approaches have high performance overheads on applications, and using custom hardware to mitigate these overheads can result in rigid schemes that are unable to adapt to new threats. In this thesis, we will describe steps to build an architectural framework for runtime monitoring that can address the drawbacks of pre...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
The last decade has seen an increased ubiquity of computers with the widespread adoption of smartpho...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Poster presented in 28th GI/ITG International Conference on Architecture of Computing Systems (ARCS ...
Critical real-time systems have become a popular target for cyber attacks. Attack vectors exist all ...
This research explores how hardware-based primitives can be implemented to perform security-related ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
In this paper we present the state of our work on runtime monitoring for real-time systems: a way to...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
University of Minnesota Ph.D. dissertation. June 2012. Major: Computer science. Advisor:Professor An...
20th International Conference on Reliable Software Technologies - Ada-Europe 2015 (Ada-Europe 2015),...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
The last decade has seen an increased ubiquity of computers with the widespread adoption of smartpho...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Poster presented in 28th GI/ITG International Conference on Architecture of Computing Systems (ARCS ...
Critical real-time systems have become a popular target for cyber attacks. Attack vectors exist all ...
This research explores how hardware-based primitives can be implemented to perform security-related ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
In this paper we present the state of our work on runtime monitoring for real-time systems: a way to...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
University of Minnesota Ph.D. dissertation. June 2012. Major: Computer science. Advisor:Professor An...
20th International Conference on Reliable Software Technologies - Ada-Europe 2015 (Ada-Europe 2015),...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...