The increased sharing of computational resources elevates the risk of side channels and covert channels, where an entity’s security is affected by the entities with which it is co-located. This introduces a strong demand for mechanisms that can effectively isolate individual computations. Such mechanisms should be efficient, allowing resource utilisation to be maximised despite isolation. In this work, we develop a model for uniformly describing isolation, co-location and containment relationships between entities at multiple levels of a computer’s architecture and at different granularities. In particular, we examine the formulation of constraints on co-location and placement using partial specifications, as well as the cost of maintaining...
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for b...
Computer security is an important issue in determining the dependability of computer systems. It bec...
Depuis les travaux de Ristenpart [Ristenpart et al., 2009], les attaques par canaux auxiliaires se s...
Side and covert channels (referred to collectively as illicit channels) are an insidious affliction ...
THe confinement problem is concerned with preventing a computaitonal service from divulging informa...
Abstract. Physical isolation provides tenants in a cloud with strong security guarantees, yet dedica...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
Many embedded systems have relatively strong security requirements because they handle confidential ...
International audienceComputer systems software and hardware architec-tures have become increasingly...
separation, containment, utility computing, HPUX, assurance One of the key aspects of securing a sys...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we investigate the influence of two types of isolation on malware propagation within ...
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for b...
Computer security is an important issue in determining the dependability of computer systems. It bec...
Depuis les travaux de Ristenpart [Ristenpart et al., 2009], les attaques par canaux auxiliaires se s...
Side and covert channels (referred to collectively as illicit channels) are an insidious affliction ...
THe confinement problem is concerned with preventing a computaitonal service from divulging informa...
Abstract. Physical isolation provides tenants in a cloud with strong security guarantees, yet dedica...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
Many embedded systems have relatively strong security requirements because they handle confidential ...
International audienceComputer systems software and hardware architec-tures have become increasingly...
separation, containment, utility computing, HPUX, assurance One of the key aspects of securing a sys...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we investigate the influence of two types of isolation on malware propagation within ...
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for b...
Computer security is an important issue in determining the dependability of computer systems. It bec...
Depuis les travaux de Ristenpart [Ristenpart et al., 2009], les attaques par canaux auxiliaires se s...