Sciweavers

25 search results - page 4 / 5
» Protection in Grasshopper: A Persistent Operating System
Sort
View
USS
2008
13 years 8 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
SOSP
2009
ACM
14 years 3 months ago
Surviving sensor network software faults
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron...
Yang Chen, Omprakash Gnawali, Maria A. Kazandjieva...
ACSAC
2005
IEEE
14 years 4 hour ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
EMSOFT
2006
Springer
13 years 10 months ago
Reliability mechanisms for file systems using non-volatile memory as a metadata store
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata...
Kevin M. Greenan, Ethan L. Miller
ISW
2007
Springer
14 years 15 days ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...