@inproceedings{bb5f9ce2da5e46f5b77a593d737f00db,
title = "Security vulnerabilities: From measurements to design",
abstract = "This paper presents a study that uses extensive analysis of real security vulnerabilities to drive the development of: 1) runtime techniques for detection/masking of security attacks and 2) formal source code analysis methods to enable identification and removal of potential security vulnerabilities. The presentation will describe the hardware architecture of a Reliability and Security Engine (RSE) that embodies the proposed techniques, to provide run-time checking at the processor level.",
keywords = "Analysis of security vulnerabilities, Masking techniques, Runtime detection of security attacks",
author = "Iyer, {Ravishankar K}",
year = "2006",
doi = "10.1145/1128817.1128823",
language = "English (US)",
isbn = "1595932720",
series = "Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06",
pages = "15",
booktitle = "Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06",
note = "2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 ; Conference date: 21-03-2007 Through 24-03-2007",
}