Sciweavers

576 search results - page 2 / 116
» Implementing a secure setuid program
Sort
View
136
Voted
CASES
2010
ACM
14 years 11 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
109
Voted
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 11 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
169
Voted
POPL
2007
ACM
16 years 1 months ago
Secure implementations of typed channel abstractions
Michele Bugliesi, Marco Giunti
92
Voted
ESOP
2003
Springer
15 years 6 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
154
Voted
IFIP
2009
Springer
14 years 10 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy