Sciweavers

196 search results - page 3 / 40
» Secure in-VM monitoring using hardware virtualization
Sort
View
SOSP
2003
ACM
14 years 2 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
13 years 11 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
CCS
2008
ACM
13 years 7 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
DAC
2008
ACM
13 years 7 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
HAPTICS
2007
IEEE
13 years 11 months ago
Time-Domain Passivity Control of Haptic Interfaces with Tunable Damping Hardware
We describe a time-domain passivity control methodology that uses programmable eddy current viscous dampers to prevent a user from extracting energy from a haptic interface. A pas...
Andrew H. C. Gosline, Vincent Hayward