Abstract

This paper presents a study that uses extensive analysis of real security vulnerabilities to drive the development of: 1) runtime techniques for detection/masking of security attacks and 2) formal source code analysis methods to enable identification and removal of potential security vulnerabilities. The presentation will describe the hardware architecture of a Reliability and Security Engine (RSE) that embodies the proposed techniques, to provide run-time checking at the processor level.

Original languageEnglish (US)
Title of host publicationProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
Number of pages1
DOIs
StatePublished - Dec 1 2006
Event2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 - Taipei, Taiwan, Province of China
Duration: Mar 21 2007Mar 24 2007

Publication series

NameProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
Volume2006

Other

Other2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
CountryTaiwan, Province of China
CityTaipei
Period3/21/073/24/07

Keywords

  • Analysis of security vulnerabilities
  • Masking techniques
  • Runtime detection of security attacks

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Security vulnerabilities: From measurements to design'. Together they form a unique fingerprint.

Cite this