Several system-level operations trigger bulk data copy or initialization. Even though these bulk data operations do not require any computation, current systems transfer a large …
F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide an easy-to-implement platform for scalable, high-availability services, they also introduce …
L Guan, J Lin, B Luo, J Jing… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Cryptography plays an important role in computer and communication security. In practical implementations of cryptosystems, the cryptographic keys are usually loaded into the …
S Lee, Y Kim, J Kim, J Kim - 2014 IEEE Symposium on Security …, 2014 - ieeexplore.ieee.org
Graphics processing units (GPUs) are important components of modern computing devices for not only graphics rendering, but also efficient parallel computations. However, their …
Y Tang, P Ames, S Bhamidipati, A Bijlani… - … USENIX Symposium on …, 2012 - usenix.org
Mobile-device theft and loss have reached gigantic proportions. Despite these threats, today's mobile devices are saturated with sensitive information due to operating systems that …
Reliable on-off control of peripherals on smart devices is a key to security and privacy in many scenarios. Journalists want to reliably turn off radios to protect their sources during …
K Lu, C Song, T Kim, W Lee - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Operating system kernel is the de facto trusted computing base for most computer systems. To secure the OS kernel, many security mechanisms, eg, kASLR and StackGuard, have …
In existing systems, the off-chip memory interface allows the memory controller to perform only read or write operations. Therefore, to perform any operation, the processor must first …
R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. This article seeks to understand existing security isolation techniques by …