ROLE
BOOKMARK & SHARE
|
|
Result page:
1
2
3
4
5
6
7
8
1
March 2016
DATE '16: Proceedings of the 2016 Conference on Design, Automation & Test in Europe
Publisher: EDA Consortium
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0, Downloads (12 Months): 0, Downloads (Overall): 0
Full text available:
PDF
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe. This paper proposes a hardware-based security architecture for microprocessors used in safety-critical systems. The proposed architecture provides protection against code injection and code reuse attacks. It ...
2
February 2013
IEEE Security and Privacy: Volume 11 Issue 2, March 2013
Publisher: IEEE Educational Activities Department
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Keywords:
Computer security,Software development,Software reliability,Privacy,Semantics,Syntactics,patch-based attacks,software protection,binary code diversity,diffing tools
3
February 2013
Journal of Systems Architecture: the EUROMICRO Journal: Volume 59 Issue 3, March, 2013
Publisher: Elsevier North-Holland, Inc.
We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the context of the seminal paper published by Popek and Goldberg 38years ago. Because their definitions are dated, we first extend their machine model to modern architectures with paged virtual memory, IO and interrupts. We then ...
Keywords:
Instruction set architecture, Virtual machine monitor, Binary translation, Hypervisor, Virtualization
4
November 2012
ICISC'12: Proceedings of the 15th international conference on Information Security and Cryptology
Publisher: Springer-Verlag
Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting ...
Keywords:
tunneling, network penetration, Metasploit, domain name system
5
October 2012
FPS'12: Proceedings of the 5th international conference on Foundations and Practice of Security
Publisher: Springer-Verlag
This paper presents class hierarchy flattening, a novel obfuscation technique for programs written in object-oriented, managed programming languages. Class hierarchy flattening strives for maximally removing the inheritance relations from object-oriented programs, thus hiding the overall design of the program from reverse engineers and other attackers. We evaluate the potential of ...
Keywords:
obfuscation, class hierarchy, program design, Java bytecode
6
October 2012
FPS'12: Proceedings of the 5th international conference on Foundations and Practice of Security
Publisher: Springer-Verlag
We present GHUMVEE, a multi-variant execution engine for software intrusion detection. GHUMVEE transparently executes and monitors diversified replicae of processes to thwart attacks relying on a predictable, single data layout. Unlike existing tools, GHUMVEE's interventions in the process' execution are not limited to system call invocations. Because of that design ...
Keywords:
non-determinism, diversified process replicae, memory exploits
7
May 2012
Single processing units have now reached a point where further major improvements in their performance are restricted by their physical limitations. This is causing a slowing down in advances at the same time as new scientific challenges are demanding exascale speed. This has meant that parallel processing has become key ...
8
September 2010
PACT '10: Proceedings of the 19th international conference on Parallel architectures and compilation techniques
Publisher: ACM
Bibliometrics:
Citation Count: 28
Downloads (6 Weeks): 3, Downloads (12 Months): 33, Downloads (Overall): 533
Full text available:
PDF
Speeding up sequential programs on multicores is a challenging problem that is in urgent need of a solution. Automatic parallelization of irregular pointer-intensive codes, exemplified by the SPECint codes, is a very hard problem. This paper shows that, with a helping hand, such auto-parallelization is possible and fruitful. This paper ...
Keywords:
semantic annotation, semi-automatic parallelization
9
August 2010
Parallel Computing: Volume 36 Issue 9, September, 2010
Publisher: Elsevier Science Publishers B. V.
Traditional static analysis fails to auto-parallelize programs with a complex control and data flow. Furthermore, thread-level parallelism in such programs is often restricted to pipeline parallelism, which can be hard to discover by a programmer. In this paper we propose a tool that, based on profiling information, helps the programmer ...
Keywords:
Pipeline parallelism, Auto-parallelization, Coarse-grain parallelism, Profile-based parallelization, Feedback directed analysis
10
June 2010
The Computer Journal: Volume 53 Issue 6, July 2010
Publisher: Oxford University Press
The Cell Broadband Engine (BE) Architecture is a new heterogeneous multi-core architecture targeted at compute-intensive workloads. The architecture of the Cell BE has several features that are unique in high-performance general-purpose processors, most notably the extensive support for vectorization, scratch pad memories and explicit programming of direct memory accesses (DMAs) ...
11
June 2010
DAC '10: Proceedings of the 47th Design Automation Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1, Downloads (12 Months): 8, Downloads (Overall): 246
Full text available:
PDF
This paper describes the HiPEAC vision of embedded virtualization as it has developed during two years of discussion among the members of the HiPEAC cluster on binary translation and virtualization. We start from system virtualization and process virtualization and we gradually develop a vision in which the two merge into ...
Keywords:
embedded virtualization, deferred compilation, HiPEAC
12
May 2009
CF '09: Proceedings of the 6th ACM conference on Computing frontiers
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1, Downloads (12 Months): 12, Downloads (Overall): 267
Full text available:
Pdf
There is a trend towards using accelerators to increase performance and energy efficiency of general-purpose processors. Adoption of accelerators, however, depends on the availability of tools to facilitate programming these devices. In this paper, we present techniques for automatically partitioning programs for execution on accelerators. We call the off-loaded code ...
Keywords:
accelerators, sub-algorithms, off-loading, partitioning
13
May 2009
SP '09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks onmodern x86 processors. We study how modern x86 processors can leak timinginformation through side-channels that relate to control flow and data flow. Toeliminate key-dependent control flow and key-dependent timing behavior relatedto control ...
14
April 2009
Transactions on High-Performance Embedded Architectures and Compilers II
Publisher: Springer-Verlag
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment presented by most embedded systems. However, there is still room for improvement: it has been shown that ...
15
March 2009
Information Security and Cryptology --- ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Publisher: Springer-Verlag
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most ...
Keywords:
binary rewriting, code fragment matching, software protection, diversity
16
Stefan Valentin Gheorghita,
Martin Palkovic,
Juan Hamers,
Arnout Vandecappelle,
Stelios Mamagkakis,
Twan Basten,
Lieven Eeckhout,
Henk Corporaal,
Francky Catthoor,
Frederik Vandeputte,
Koen De Bosschere
January 2009
ACM Transactions on Design Automation of Electronic Systems (TODAES): Volume 14 Issue 1, January 2009
Publisher: ACM
Bibliometrics:
Citation Count: 39
Downloads (6 Weeks): 8, Downloads (12 Months): 54, Downloads (Overall): 1,097
Full text available:
PDF
In the past decade, real-time embedded systems have become much more complex due to the introduction of a lot of new functionality in one application, and due to running multiple applications concurrently. This increases the dynamic nature of today's applications and systems, and tightens the requirements for their constraints in ...
Keywords:
embedded systems, energy reduction, system scenarios, dynamic nature, real-time systems, Design methodology
17
August 2008
Euro-Par '08: Proceedings of the 14th international Euro-Par conference on Parallel Processing
Publisher: Springer-Verlag
This topic deals with architecture design and compilation for high performance systems --- the discovery and support of parallelism at all levels. The areas of interest range from microprocessors to large-scale parallel machines; from general-purpose platforms to specialized hardware (e.g., graphic coprocessors, low-power embedded systems); and from hardware design to ...
18
April 2008
ISPEC'08: Proceedings of the 4th international conference on Information security practice and experience
Publisher: Springer-Verlag
In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts. However, little information seems to be available on the implementation aspects or cost of the different schemes. This paper tries to fill the gap by presenting our experience with several encryption techniques: ...
19
March 2008
SCOPES '08: Proceedings of the 11th international workshop on Software & compilers for embedded systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 22, Downloads (Overall): 308
Full text available:
PDF
The memory footprint is considered an important constraint for embedded systems. This is especially important in the context of increasing sophistication of embedded software, and the increasing use of modern software engineering techniques like component-based design. Since reusability is the major motivation for using components, most components are not optimized ...
20
Constructing optimal XOR-functions to minimize cache conflict misses
February 2008
ARCS'08: Proceedings of the 21st international conference on Architecture of computing systems
Publisher: Springer-Verlag
Stringent power and performance constraints, coupled with detailed knowledge of the target applications of a processor, allows for application-specific processor optimizations. It has been shown that application-specific reconfigurable hash functions eliminate a large number of cache conflict misses. These hash functions minimize conflicts by modifying the mapping of cache blocks ...
|
|