Results 1 - 10
of
35
Secure Cryptographic Precomputation with Insecure Memory ⋆
"... Abstract. We propose a solution that provides secure storage for cryptographic precomputation using only insecure memory that is susceptible to eavesdropping and tampering. Specifically, we design a small tamper-resistant hardware module, the Queue Security Proxy (QSP), that situates transparently o ..."
Abstract
- Add to MetaCart
on the data-path between the processor and the insecure memory. Our analysis shows that our design is secure and flexible, and yet efficient and inexpensive. In particular, both the timing overhead and the hardware cost of our solution are independent of the storage size.
Gender, Food Insecurity and IFIs in Kenya
"... Approximately 10 percent of Kenya’s population, or 3.8 million people, live in a chronic state of food insecurity (USDA, 2009), the most vulnerable of whom include women and children (Kimani-Murage, et al., 2011). Although women constitute 75 percent of Kenya’s agricultural labor force, gender inequ ..."
Abstract
- Add to MetaCart
Approximately 10 percent of Kenya’s population, or 3.8 million people, live in a chronic state of food insecurity (USDA, 2009), the most vulnerable of whom include women and children (Kimani-Murage, et al., 2011). Although women constitute 75 percent of Kenya’s agricultural labor force, gender
Virtual Secure Co-Processing on General-purpose Processors
, 2002
"... Cryptographic processing is a critical component of secure Internet-connected computing systems. Furthermore, the methods employed to manage, store, and exercise a user’s cryptographic keys greatly affect the security offered by cryptographic operations. Software-only user key management schemes con ..."
Abstract
-
Cited by 14 (2 self)
- Add to MetaCart
, performance penalties, and high cost. In this paper, we propose architectural features for general-purpose processors that facilitate virtual secure coprocessing. We describe modest hardware modifications and a trusted software library that allow general-purpose processors to perform flexible, high
Caisson: A Hardware Description Language for Secure Information Flow
- IN PROCEEDINGS OF PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI 2011
, 2011
"... Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s root of trust. We incorporate insights and techniques from designing information-flow secure programming languages to provide a ..."
Abstract
-
Cited by 16 (6 self)
- Add to MetaCart
consumption, and clock frequency with both a standard (insecure) commercial processor and also a processor augmented at the gate level to dynamically track information flow. Our processor is competitive with the insecure processor and significantly better than dynamic tracking.
Micro Embedded Monitoring for Security in Application Specific Instruction-set Processors
- In Proceedings of the CASES’05
, 2005
"... This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstructions are embedded into the critical machin ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstructions are embedded into the critical
Modern Vehicle Safety System And Fuel Level Intimation using ARM processor
"... Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibility for taking steps to ensure the authorization for the owners and also in built the anti theft system to prevent the vehicle from the theft.ARM pr ..."
Abstract
- Add to MetaCart
Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibility for taking steps to ensure the authorization for the owners and also in built the anti theft system to prevent the vehicle from the theft
A Low Cost Advanced Encryption Standard (AES) Co-Processor Implementation
"... The need for privacy has become a major priority for both governments and civilians desiring protection from signal interception. Widespread use of personal communications devices has only increased demand for a level of security on previously insecure communications. This paper presents a novel low ..."
Abstract
- Add to MetaCart
The need for privacy has become a major priority for both governments and civilians desiring protection from signal interception. Widespread use of personal communications devices has only increased demand for a level of security on previously insecure communications. This paper presents a novel
Capture of an Intruder by Mobile Agents
, 2002
"... Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' s ..."
Abstract
-
Cited by 69 (22 self)
- Add to MetaCart
, or cannot reach an arbitrary point of the network via an internal travel through insecure zones. This motivates the contiguous search problem in which agents cannot be removed from the network, and clear links must form a connected sub-network at any time, providing safety of movements. This new problem
High-Bandwidth Encryption with Low-Bandwidth Smartcards
- In Fast Software Encryption
, 1995
"... This paper describes a simple protocol, the Remotely Keyed Encryption Protocol (RKEP), that enables a secure, but bandwidth-limited, cryptographic smartcard to function as a highbandwidth secret-key encryption and decryption engine for an insecure, but fast, host processor. The host processor assum ..."
Abstract
-
Cited by 43 (1 self)
- Add to MetaCart
This paper describes a simple protocol, the Remotely Keyed Encryption Protocol (RKEP), that enables a secure, but bandwidth-limited, cryptographic smartcard to function as a highbandwidth secret-key encryption and decryption engine for an insecure, but fast, host processor. The host processor
Hardware Enforcement of Application Security Policies Using Tagged Memory
"... Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and ..."
Abstract
-
Cited by 41 (7 self)
- Add to MetaCart
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions
Results 1 - 10
of
35