Zobrazeno 1 - 10
of 106
pro vyhledávání: '"Sethumadhavan, Simha"'
Architects and systems designers artfully balance multiple competing design constraints during the design process but are unable to translate between system metrics and end user experience. This work presents three methodologies to fill in this gap.
Externí odkaz:
http://arxiv.org/abs/2204.13698
In this paper we introduce Timeloops a novel technique for automatically learning system call filtering policies for containerized microservices applications. At run-time, Timeloops automatically learns which system calls a program should be allowed
Externí odkaz:
http://arxiv.org/abs/2204.06131
Security mandates today are often in the form of checklists and are generally inflexible and slow to adapt to changing threats. This paper introduces an alternate approach called open mandates, which mandate that vendors must dedicate some amount of
Externí odkaz:
http://arxiv.org/abs/2203.05015
Autor:
Manzhosov, Evgeny, Hastings, Adam, Pancholi, Meghna, Piersma, Ryan, Ziad, Mohamed Tarek Ibn, Sethumadhavan, Simha
Residue codes have been traditionally used for compute error correction rather than storage error correction. In this paper, we use these codes for storage error correction with surprising results. We find that adapting residue codes to modern memory
Externí odkaz:
http://arxiv.org/abs/2107.09245
In this paper, we propose the Stateless Permutation of Application Memory (SPAM), a software defense that enables fine-grained data permutation for C programs. The key benefits include resilience against attacks that directly exploit software errors
Externí odkaz:
http://arxiv.org/abs/2007.13808
Autor:
Hastings, Adam, Sethumadhavan, Simha
In this paper, we promote the idea that recent woes in hardware security are not because of a lack of technical solutions but rather because market forces and incentives prevent those with the ability to fix problems from doing so. At the root of the
Externí odkaz:
http://arxiv.org/abs/2007.09537
Cryptographic (crypto) algorithms are the essential ingredients of all secure systems: crypto hash functions and encryption algorithms, for example, can guarantee properties such as integrity and confidentiality. Developers, however, can misuse the a
Externí odkaz:
http://arxiv.org/abs/2007.01061
Autor:
Ziad, Mohamed Tarek Ibn, Arroyo, Miguel A., Manzhosov, Evgeny, Kemerlis, Vasileios P., Sethumadhavan, Simha
We introduce a novel concept, called Name Confusion, and demonstrate how it can be employed to thwart multiple classes of code-reuse attacks. By building upon Name Confusion, we derive Phantom Name System (PNS): a security protocol that provides mult
Externí odkaz:
http://arxiv.org/abs/1911.02038
Autor:
Sasaki, Hiroshi, Arroyo, Miguel A., Ziad, M. Tarek Ibn, Bhat, Koustubha, Sinha, Kanad, Sethumadhavan, Simha
Recent rapid strides in memory safety tools and hardware have improved software quality and security. While coarse-grained memory safety has improved, achieving memory safety at the granularity of individual objects remains a challenge due to high pe
Externí odkaz:
http://arxiv.org/abs/1906.01838
A Cyber-Physical System (CPS) is defined by its unique characteristics involving both the cyber and physical domains. Their hybrid nature introduces new attack vectors, but also provides an opportunity to design new security defenses. In this paper,
Externí odkaz:
http://arxiv.org/abs/1702.06595