Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Memory Protection
biblio
On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM
Submitted by grigby1 on Tue, 07/27/2021 - 12:33pm
resilience
pubcrawl
Resiliency
Software
Hardware
system-on-chip
Scalability
Cryptography
Memory Protection
Security by Default
Random access memory
supply chains
circuit simulation
Cold Boot Attack
DRAM
Rowhammer attack
supply chain protection
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
SoK: Shining Light on Shadow Stacks
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
return oriented programming
metadata
Metrics
optimization
Payloads
performance comparisons
program compilers
program diagnostics
pubcrawl
Registers
Resiliency
Memory Protection
return-oriented-programming
Scalability
security
security of data
shadow stack design
shadow stacks
shadow-stacks
Software
software security mitigations
virtual calls
control-flow-integrity
C++ languages
CFI mitigations
compatibility
compiler designers
compiler security
composability
Compositionality
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
backward edge
defense mechanisms
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
Human Factors
indirect calls
language-based-security
low performance overhead
biblio
Lord of the X86 Rings: A Portable User Mode Privilege Separation Architecture on X86
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
Human behavior
Memory Protection
Metrics
operating system
privilege separation
pubcrawl
resilience
Resiliency
Scalability
SSL Trust Models
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl