F Zhang, J Wang, K Sun… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The advent of cloud computing and inexpensive multi-core desktop architectures has led to the widespread adoption of virtualization technologies. Furthermore, security researchers …
Hardware has been constantly augmented for security considerations since the advent of computers. There is also a common perception among computer users that hardware does a …
Fueled by an emerging underground economy, malware authors are exploiting vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …
N Potlapally - 2011 IEEE International Symposium on Hardware …, 2011 - ieeexplore.ieee.org
Computing platforms used in practice are complex and require interaction between multiple hardware components (such as processor, chipset, memory and peripherals) for their …
AM Azab, P Ning, X Zhang - Proceedings of the 18th ACM conference on …, 2011 - dl.acm.org
SICE is a novel framework to provide hardware-level isolation and protection for sensitive workloads running on x86 platforms in compute clouds. Unlike existing isolation techniques …
Caches pose a significant challenge to formal proofs of security for code executing on application processors, as the cache access pattern of security-critical services may leak …
With the rapid proliferation of malware attacks on the Internet, understanding these malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
F Zhang, H Zhang - Proceedings of the Hardware and Architectural …, 2016 - dl.acm.org
Hardware-assisted Isolated Execution Environments (HIEEs) have been widely adopted to build effective and efficient defensive tools for securing systems. Hardware vendors have …