Malware-aware processors: A framework for efficient online malware detection

M Ozsoy, C Donovick, I Gorelik… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …

Hardware-based malware detection using low-level architectural features

M Ozsoy, KN Khasawneh, C Donovick… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …

Iso-x: A flexible architecture for hardware-managed isolated execution

D Evtyushkin, J Elwell, M Ozsoy… - 2014 47th Annual …, 2014 - ieeexplore.ieee.org
We consider the problem of how to provide an execution environment where the
application's secrets are safe even in the presence of malicious system software layers. We …

Understanding and mitigating covert channels through branch predictors

D Evtyushkin, D Ponomarev… - ACM Transactions on …, 2016 - dl.acm.org
Covert channels through shared processor resources provide secret communication
between two malicious processes: the trojan and the spy. In this article, we classify, analyze …

Secure initialisation

J Parker, RR Grisenthwaite, AC Rose… - US Patent …, 2020 - Google Patents
(57) ABSTRACT A data processing system for processing data using a memory having a
plurality of memory regions, a given memory region within said plurality of memory regions …

Flexible hardware-managed isolated execution: Architecture, software support and applications

D Evtyushkin, J Elwell, M Ozsoy… - … on Dependable and …, 2016 - ieeexplore.ieee.org
We consider the problem of how to provide an execution environment where the
application's secrets are safe even in the presence of malicious system software layers. We …

Learning non-metric partial similarity based on maximal margin criterion

X Tan, S Chen, J Li, ZH Zhou - 2006 IEEE Computer Society …, 2006 - ieeexplore.ieee.org
The performance of many computer vision and machine learning algorithms critically
depends on the quality of the similarity measure defined over the feature space. Previous …

Apparatus and method for address translation and control of whether an access request is rejected based on an ownership table indicating an owner process for a …

J Parker, RR Grisenthwaite, AC Rose - US Patent 10,936,504, 2021 - Google Patents
(57) ABSTRACT A data processing apparatus (20) comprises address trans lation circuitry
(40) to translate a first address into a physical address directly identifying a corresponding …

Rethinking memory permissions for protection against cross-layer attacks

J Elwell, R Riley, N Abu-Ghazaleh… - ACM Transactions on …, 2015 - dl.acm.org
The inclusive permissions structure (eg, the Intel ring model) of modern commodity CPUs
provides privileged system software layers with arbitrary permissions to access and modify …

Lineamientos de accesibilidad universal y espacios públicos inclusivos en el Centro Histórico de Trujillo-2022

DC Gamboa Villacorta - 2022 - repositorio.ucv.edu.pe
La presente investigación nace debido al gran problema que viven a diario las personas
con discapacidad al momento de trasladarse por el Centro Histórico de Trujillo, ya que los …