Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Julian Horsch"'
Publikováno v:
Information Security and Cryptology – ICISC 2021 ISBN: 9783031088957
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2062b1acd0ffcdefbad48f733685c67a
https://doi.org/10.1007/978-3-031-08896-4_9
https://doi.org/10.1007/978-3-031-08896-4_9
Publikováno v:
Computers & Security. 86:420-436
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive main memory on modern devices against memory attacks, such as via coldboot, DMA, or JTAG. This goal is of special significance when it comes to protec
While memory corruption bugs stemming from the use of unsafe programming languages are an old and well-researched problem, the resulting vulnerabilities still dominate real-world exploitation today. Various mitigations have been proposed to alleviate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c624badb6c9691937652c676ba46c1fa
AMD SEV is a hardware extension for main memory encryption on multi-tenant systems. SEV uses an on-chip coprocessor, the AMD Secure Processor, to transparently encrypt virtual machine memory with individual, ephemeral keys never leaving the coprocess
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c6f99029f5c14bb0f99f09ea8775c260
http://arxiv.org/abs/1901.01759
http://arxiv.org/abs/1901.01759
Publikováno v:
EuroSec@EuroSys
AMD SEV is a hardware feature designed for the secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but also from a possibly malicious hypervisor. This relieves
Autor:
Philipp Zieris, Julian Horsch
Manipulations of return addresses on the stack are the basis for a variety of attacks on programs written in memory unsafe languages. Dual stack schemes for protecting return addresses promise an efficient and effective defense against such attacks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f6428a4fad77b533d9e0274c66b475c
Publikováno v:
TrustCom/BigDataSE/ICESS
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. In this paper, we present TransCrypt, a concept for transparent and guest-agnostic, dynamic kernel and user main memory encryption using a custom minim
Publikováno v:
ACSAC
Keys for symmetric cryptography are usually stored in RAM and therefore susceptible to various attacks, ranging from simple buffer overflows to leaks via cold boot, DMA or side channels. A common approach to mitigate such attacks is to move the keys
Publikováno v:
Information Security and Cryptology ISBN: 9783319388977
Inscrypt
Inscrypt
In this paper, we present a novel secure architecture for OS-level virtualization on mobile devices. OS-level virtualization allows to simultaneously operate multiple userland OS instances on one physical device. Compared to previous approaches, our
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3febf5760b9c34bcf38670a30f23bd4
https://doi.org/10.1007/978-3-319-38898-4_25
https://doi.org/10.1007/978-3-319-38898-4_25
Autor:
Julian Horsch, Sascha Wessel
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA.