Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Roger Khazan"'
Autor:
Samuel Jero, Nathan Burow, Bryan Ward, Richard Skowyra, Roger Khazan, Howard Shrobe, Hamed Okhravi
Publikováno v:
ACM Computing Surveys. 55:1-34
Software security defenses are routinely broken by the persistence of both security researchers and attackers. Hardware solutions based on tagging are emerging as a promising technique that provides strong security guarantees (e.g., memory safety) wh
Autor:
Alexandra Clifford, Richard Skowyra, Bryan C. Ward, Samuel Jero, Bite Ye, Gabriel Parmer, Phani Kishore Gadepalli, Juliana Furgala, Runyu Pan, Roger Khazan
Publikováno v:
RTAS
Many embedded systems have evolved from simple bare-metal control systems to highly complex network-connected systems. These systems increasingly demand rich and feature-full operating-systems (OS) functionalities. Furthermore, the network connectedn
Publikováno v:
MTD@CCS
Moving-target defenses (MTDs) have been widely studied for common general-purpose and enterprise-computing applications. Indeed, such work has produced highly effective, low-overhead defenses that are now commonly deployed in many systems today. One
Autor:
Narek Pezeshkian, John Yen, David A. Wilson, Joseph D. Neff, Rafael Suero, Daniil M. Utin, Hoa G. Nguyen, Benjamin Nahill, Brian Telle, Jacob Leemaster, Roger Khazan, Joseph Sobchuk
Publikováno v:
Unmanned Systems Technology XXI.
Under the Navy’s Flexible Cyber-Secure Radio (FlexCSR) program, the Naval Information Warfare Center Pacific and the Massachusetts Institute of Technology’s Lincoln Laboratory are jointly developing a unique cybersecurity solution for tactical un
Publikováno v:
NCA
This paper explains the process by which Intel Software Guard Extensions (SGX) can be leveraged into an existing codebase to protect a security-sensitive application. Intel SGX provides user-level applications with hardware-enforced confidentiality a
Publikováno v:
HPEC
For decades, embedded systems, ranging from intelligence, surveillance, and reconnaissance (ISR) sensors to electronic warfare and electronic signal intelligence systems, have been an integral part of U.S. Department of Defense (DoD) mission systems.
Autor:
Kyle Hogan, Jacob Leemaster, Michael Vai, Ilia Lebedev, Roger Khazan, Yunsi Fei, Haley Whitman, Srini Devadas, David Whelihan, Willahelm Wan
Publikováno v:
QRS Companion
The processor of a drone runs essential functions of sensing, communications, coordination, and control. This is the conventional view. But in today's cyber environment, the processor must also provide security to assure mission completion. We have b
Autor:
John Sherer, Aaron Mills, David A. Wilson, Roger Khazan, Benjamin Nahill, Martin Kiernicki, Michael Vai
Publikováno v:
MILCOM
As the rate at which digital data is generated continues to grow, so does the need to ensure that data can be stored securely. The use of an NSA-certified Inline Media Encryptor (IME) is often required to protect classified data, as its security prop
Publikováno v:
Journal of Hardware and Systems Security. 3:199-199
Publikováno v:
MILCOM
Real-time monitoring of physiological data can reduce the likelihood of injury in noncombat military personnel and first-responders. MIT Lincoln Laboratory is developing a tactical Real-Time Physiological Status Monitoring (RT-PSM) system architectur