Now showing items 1-10 of 17
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
(Georgia Institute of Technology, 2016-09-23)
Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds
(Georgia Institute of Technology, 2016-09-30)
Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...
Managing Product Security and Integrity in a Global Supply Chain
(Georgia Institute of Technology, 2016-10-07)
Cisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority ...
Defending against Advanced Return-Oriented Programming Attacks
(Georgia Institute of Technology, 2016-10-21)
Fault injection as an attack vector against trustworthy embedded systems
(Georgia Institute of Technology, 2016-10-28)
In the Internet of Things, the cyber-world will use a huge number of small embedded computing elements to control and sense the real world. The integrity and trustworthiness of these embedded systems is crucial; their ...
The Evolution of Modern Malware: Technology Trends and Motivations
(Georgia Institute of Technology, 2016-11-04)
Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist ...
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes
(Georgia Institute of Technology, 2016-11-18)
Bulletproof hosting Autonomous Systems (ASes)—malicious ASes fully dedicated to supporting cybercrime—provide freedom and resources for a cyber-criminal to operate. Their services include hosting a wide range of illegal ...
Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals
(Georgia Institute of Technology, 2016-09-16)
A side-channel attack is an attack that exploits the low-power electronic signals a device emits even when it’s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. ...
Security Applications of Bitcoin
(Georgia Institute of Technology, 2016-02-26)
Protecting Computer Systems through Eliminating Vulnerabilities
(Georgia Institute of Technology, 2016-01-29)
Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have ...