H Wu, Y Chen, Y Zhou, Y Wang… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Driver-originated vulnerabilities are well-known threats to modern monolithic kernels. However, existing driver isolation solutions either rely on Intel-only or newly-introduced CPU …
Y Guo, Z Wang, B Zhong, Q Zeng - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Privileged system software such as mainstream operating system kernels and hypervisors have an ongoing stream of vulnerabilities. Even the inflated secure world in Trusted …
Operating systems manage and configure a machine's physical resources such as memory and translation hardware. This task is mission critical: the operating system must always …
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However, it also implies that once an attacker takes control of the OS kernel, the …
Abstract Distributed Denial of Service (DDoS) attacks are a significant threat to the Internet today, and application-layer DDoS attacks that use legitimate HTTP requests to overwhelm …
A Siswanto, A Efendi, Z Hasrin, B Arifin - International conference on smart …, 2021 - Springer
Security is one of the most significant needs for people everywhere. Likewise, people usually use a safe deposit box (SDB) to store valuables for the storage of goods. However …
Security is one of the most significant needs for people everywhere. Likewise, people usually use a safe deposit box (SDB) to store valuables for the storage of goods. However …
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …