Security of IoT systems: Design challenges and opportunities

T Xu, JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …

RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization

V Seshadri, Y Kim, C Fallin, D Lee… - Proceedings of the 46th …, 2013 - dl.acm.org
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …

Security issues and challenges for virtualization technologies

F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …

Protecting private keys against memory disclosure attacks using hardware transactional memory

L Guan, J Lin, B Luo, J Jing… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Cryptography plays an important role in computer and communication security. In practical
implementations of cryptosystems, the cryptographic keys are usually loaded into the …

Stealing webpages rendered on your browser by exploiting GPU vulnerabilities

S Lee, Y Kim, J Kim, J Kim - 2014 IEEE Symposium on Security …, 2014 - ieeexplore.ieee.org
Graphics processing units (GPUs) are important components of modern computing devices
for not only graphics rendering, but also efficient parallel computations. However, their …

{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction

Y Tang, P Ames, S Bhamidipati, A Bijlani… - … USENIX Symposium on …, 2012 - usenix.org
Mobile-device theft and loss have reached gigantic proportions. Despite these threats,
today's mobile devices are saturated with sensitive information due to operating systems that …

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

Unisan: Proactive kernel memory initialization to eliminate data leakages

K Lu, C Song, T Kim, W Lee - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Operating system kernel is the de facto trusted computing base for most computer systems.
To secure the OS kernel, many security mechanisms, eg, kASLR and StackGuard, have …

Simple operations in memory to reduce data movement

V Seshadri, O Mutlu - Advances in Computers, 2017 - Elsevier
In existing systems, the off-chip memory interface allows the memory controller to perform
only read or write operations. Therefore, to perform any operation, the processor must first …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …