Filters








385 Hits in 5.1 sec

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version [article]

Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saidi
2020 arXiv   pre-print
This paper explores feasibility of designing and implementing a toolchain for Augmentation and Legacy-software Instrumentation of Cryptographic Executables (ALICE).  ...  We demonstrate practical feasibility of our approach on cryptographic hash functions with several popular cryptographic libraries and real-world programs of various levels of complexity.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of DHS and should not be interpreted as necessarily  ... 
arXiv:2004.09713v2 fatcat:dpug4wftgvdpdoiz2wx7hozmdu

Run-Time Security Traceability for Evolving Systems

A. Bauer, J. Jurjens, Y. Yu
2010 Computer journal  
The extra effort for it is small as most of the computation is automated; however, additional resources at run-time may be required.  ...  A lot of vulnerabilities have been found in current software systems both at the specification and the implementation levels.  ...  Acknowledgements Discussions with Martin Leucker about a draft of this paper are gratefully acknowledged, as well as constructive comments by the reviewers which helped improving the presentation significantly  ... 
doi:10.1093/comjnl/bxq042 fatcat:5atpkvz7d5gufpvphwjno65lsa

Microarchitectural Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors

Yunsi Fei, Z. Jerry Shi
2007 2007 Design, Automation & Test in Europe Conference & Exhibition  
The monitor observes the processor's execution trace of basic blocks at run-time, checks whether the execution trace aligns with the expected program behavior, and signals any mismatches.  ...  We embed monitoring microoperations in machine instructions, thus the processor is augmented with a hardware monitor automatically.  ...  Sri Parameswaran and Roshan Ragel of the University of New South Wales, Australia for their helpful discussions and suggestions on ASIP Meister usage.  ... 
doi:10.1109/date.2007.364391 dblp:conf/date/FeiS07 fatcat:bj2ouj7trbcdrcdxukuxclg7tq

Replacement attacks against VM-protected applications

Sudeep Ghosh, Jason Hiser, Jack W. Davidson
2012 Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments - VEE '12  
This dynamic protection, combined with its flexibility, ease in handling legacy systems and low performance overhead, has made process-level virtualization a popular approach for providing software protection  ...  We present a general description of the replacement attack methodology and two attack implementations against a protected application using freely available tools.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2151024.2151051 dblp:conf/vee/GhoshHD12 fatcat:pnkjc54cnbgjva6gtrtguyi5n4

Replacement attacks against VM-protected applications

Sudeep Ghosh, Jason Hiser, Jack W. Davidson
2012 SIGPLAN notices  
This dynamic protection, combined with its flexibility, ease in handling legacy systems and low performance overhead, has made process-level virtualization a popular approach for providing software protection  ...  We present a general description of the replacement attack methodology and two attack implementations against a protected application using freely available tools.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2365864.2151051 fatcat:ybiejivn7ng4pebpavlpzizj64

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
The networking industry in the upcoming years may be shifting towards the closed-loop control architecture (Fig. 30) Note that it is not easy to realize the vision of completely automating networks.  ...  Generally, cryptographic functions are executed externally (e.g., on a CPU) and invoked from the data plane. 2) External Cryptography The authors in [191] argue on the need to implement cryptographic  ...  Bou-Harb holds a Ph.D. degree in computer science from Concordia University in Montreal, Canada, which was executed in collaboration with Public Safety Canada, Industry Canada and NCFTA Canada.  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
advantages over Software-defined Networking (SDN) and legacy devices.  ...  To this end, this paper provides a background encompassing an overview of the evolution of networks from legacy to programmable, describing the essentials of programmable switches, and summarizing their  ...  Generally, cryptographic functions are executed externally (e.g., on a CPU) and invoked from the data plane. 2) External Cryptography The authors in [191] argue on the need to implement cryptographic  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

Distributed Ledger Technology in Payments, Clearing, and Settlement

David Mills, Kathy Wang, Brendan Malone, Anjana Ravi, Jeff Marquardt, Clinton Chen, Anton Badev, Timothy Brezinski, Linda Fahy, Kimberley Liao, Vanessa Kargenian, Max Ellithorpe (+2 others)
2016 Finance and Economics Discussion Series  
In effect, the protocol defines a set of procedures for proposing a payments path and cryptographically escrowing funds across a series of interoperable ledgers and then subsequently executing the escrowed  ...  Others may augment or even replace the services of existing financial intermediaries.  ... 
doi:10.17016/feds.2016.095 fatcat:ueklof3zc5ba5jxxwep4tfqga4

Forensic discovery auditing of digital evidence containers

Golden G. Richard, Vassil Roussev, Lodovico Marziale
2007 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Auditing of a digital investigation, from identification and seizure of evidence through duplication and investigation is, essentially, ad hoc, recorded in separate log files or in an investigator's case  ...  This allows the immediate, safe, and verifiable use of any tool deemed necessary by the examiner.  ...  the execution.  ... 
doi:10.1016/j.diin.2007.04.002 fatcat:7x3g7icvnnbv3bivypubhpdvca

Information technology measurement and testing activities at NIST

M.D. Hogan, L.J. Carnahan, R.J. Carpenter, D.W. Flater, J.E. Fowler, S.P. Frechette, M.M. Gray, L.A. Johnson, R.M. McCabe, D. Montgomery, S.M. Radack, R. Rosenthal (+1 others)
2001 Journal of Research of the National Institute of Standards and Technology  
This paper explains key terms and concepts of IT metrology, briefly reviews the history of the National Bureau of Standards/National Institute of Standards and Technology (NBS/NIST) in the field of IT,  ...  The complexity and rapidly changing nature of IT have presented unique technical challenges to the National Institute of Standards and Technology (NIST) and to the scientific measurement community in developing  ...  When cryptographic logic is implemented in software, the processor that executes the software is also part of the cryptographic module.  ... 
doi:10.6028/jres.106.013 pmid:27500026 pmcid:PMC4865287 fatcat:hrcfro3isjgd7l4wy4oaq3noqi

Unchaining Collective Intelligence for Science, Research, and Technology Development by Blockchain-Boosted Community Participation

Jens Ducrée, Martin Etzrodt, Sönke Bartling, Ray Walshe, Tomás Harrington, Neslihan Wittek, Sebastian Posth, Kevin Wittek, Andrei Ionita, Wolfgang Prinz, Dimitrios Kogias, Tiago Paixão (+2 others)
2021 Frontiers in Blockchain  
crowdfunding, and prediction markets, can be applied to substantially innovate the legacy organization of science, research, and technology development (RTD).  ...  On the analogy of its current blockbusters like peer-to-peer structured decentralized finance ("DeFi"), blockchain technology can seminally enhance the efficiency of science and RTD initiatives, even permitting  ...  executed in existing blockchain projects. 54,55 By offering a broad range of involvement and commitment staked by reputation and cryptoassets, pivotal flywheel effects can be unleashed toward creating  ... 
doi:10.3389/fbloc.2021.631648 fatcat:k3uqidrh4fg2he4ou2niq7v7si

Automating Privacy Enforcement in Cloud Platforms [chapter]

Peng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira
2013 Lecture Notes in Computer Science  
In this context, the compliance with regards to policies and regulations about personal data protection is essential, but hard to achieve, as the implementation of privacy controls is subject to diverse  ...  kinds of errors.  ...  Many thanks to Theodoor Scholte for his valuable comments on a previous version of this paper.  ... 
doi:10.1007/978-3-642-35890-6_12 fatcat:wgvfmafgczbbnf4duwfj25du3u

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86

David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss
2020 USENIX Security Symposium  
Efficient and secure in-process isolation is in great demand, as evidenced in the shift towards JavaScript and the recent revival of memory protection keys.  ...  Fully protecting the mbedTLS cryptographic operations has a 4 % overhead.  ...  Excellent Technologies by BMVIT, BMWFW, and Styria, and via the project ESPRESSO, which is funded by the province of Styria and the Business Promotion Agencies of Styria and Carinthia.  ... 
dblp:conf/uss/SchrammelWSS0MG20 fatcat:f3rywxsejbdgbpomcyhhzre42q

Extreme reuse: the only future any code can afford

Thomas Hoberg
2021 Zenodo  
We highlight some technologies in "Reversing John von Neumann and Steve Jobs, but not software".  ...  The efforts to contain that risk can't really be bigger than the value gained by expanding the reach of IoT.  ...  rate of execution with billions of users.  ... 
doi:10.5281/zenodo.4719689 fatcat:epsewlhmdzf2zdifqxxvikdrku

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical  ...  The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices.  ...  Blockchain -An Instrument to Augment IoT Security The success of Bitcoin brought the attention of the world to its underlying Blockchain technology [162] .  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4
« Previous Showing results 1 — 15 out of 385 results