Architects and systems designers artfully balance multiple competing des...
In this paper we introduce Timeloops a novel technique for automatically...
Security mandates today are often in the form of checklists and are gene...
In this work we present a new set of error correcting codes – Multi-Use
...
In this paper, we propose the Stateless Permutation of Application Memor...
In this paper, we promote the idea that recent woes in hardware security...
Cryptographic (crypto) algorithms are the essential ingredients of all s...
Virtual memory is an abstraction that assigns references, or names, to d...
Code-reuse attacks continue to pose a significant threat to systems secu...
Recent rapid strides in memory safety tools and hardware have improved
s...