Security of IoT systems: Design challenges and opportunities
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …
the brink of changing its scope. Following both historical and recent technological and …
RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …
bulk data operations do not require any computation, current systems transfer a large …
Security issues and challenges for virtualization technologies
F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …
an easy-to-implement platform for scalable, high-availability services, they also introduce …
Protecting private keys against memory disclosure attacks using hardware transactional memory
Cryptography plays an important role in computer and communication security. In practical
implementations of cryptosystems, the cryptographic keys are usually loaded into the …
implementations of cryptosystems, the cryptographic keys are usually loaded into the …
Stealing webpages rendered on your browser by exploiting GPU vulnerabilities
Graphics processing units (GPUs) are important components of modern computing devices
for not only graphics rendering, but also efficient parallel computations. However, their …
for not only graphics rendering, but also efficient parallel computations. However, their …
{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction
Mobile-device theft and loss have reached gigantic proportions. Despite these threats,
today's mobile devices are saturated with sensitive information due to operating systems that …
today's mobile devices are saturated with sensitive information due to operating systems that …
Secloak: Arm trustzone-based mobile peripheral control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
Unisan: Proactive kernel memory initialization to eliminate data leakages
Operating system kernel is the de facto trusted computing base for most computer systems.
To secure the OS kernel, many security mechanisms, eg, kASLR and StackGuard, have …
To secure the OS kernel, many security mechanisms, eg, kASLR and StackGuard, have …
Simple operations in memory to reduce data movement
V Seshadri, O Mutlu - Advances in Computers, 2017 - Elsevier
In existing systems, the off-chip memory interface allows the memory controller to perform
only read or write operations. Therefore, to perform any operation, the processor must first …
only read or write operations. Therefore, to perform any operation, the processor must first …
A study of security isolation techniques
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …
forms of attacks. This article seeks to understand existing security isolation techniques by …