A software solution for hardware vulnerabilities

K Dharsee, E Johnson, J Criswell - 2017 IEEE Cybersecurity …, 2017 - ieeexplore.ieee.org
Modern processors are becoming increasingly complex with features that improve
performance and add new functionality. However, such improvements are a double-edged …

[图书][B] Critical Hardware Towards Software Security Enforcement

K Dharsee - 2023 - search.proquest.com
To reach deployment, modern systems go through several levels of security verification, at
many differing abstractions. Security enforcement begins at entities (eg human users) …

Secure guest virtual machine support in apparition

E Johnson, K Dharsee, J Criswell - … of the 15th ACM SIGPLAN/SIGOPS …, 2019 - dl.acm.org
Recent research utilizing Secure Virtual Architecture (SVA) has demonstrated that compiler-
based virtual machines can protect applications from side-channel attacks launched by …

Computer-based kinetic model of glucose metabolism

W Xiong, X Zhou, B Nie, J Du - 2010 International Conference …, 2010 - ieeexplore.ieee.org
In this paper, in the compartment pharmacokinetic model of the linear elimination, Describes
the glucose metabolism in the human body, References given by the concentration of …