Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
processor architecture
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection