Making secure processors OS- and performance-friendly

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSs can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSs for Linux have been developed. In these OSs, different implementation methods have been adopted. However, there is no method for easily evaluating the perf...

متن کامل

A Case for OS-Friendly Hardware Accelerators

Modern SoCs make extensive use of specialized hardware accelerators to meet the demanding energy-efficiency requirements of demanding applications, such as computer graphics and video encoding/decoding. Unfortunately, the state of the art is a sea of heterogeneous fixed-function processing units wired together in an ad-hoc fashion, with dedicated memory spaces and a wide variety of host-acceler...

متن کامل

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the p...

متن کامل

Physical Unclonable Functions and Secure Processors

As computing devices become ever more pervasive, two contradictory trends are appearing. On one hand computing elements are becoming small, disseminated and unsupervised. On the other hand, the cost of security breaches is increasing as we place more responsibility on the devices that surround us. The result of these trends is that physical attacks present an increasing risk that must be dealt ...

متن کامل

Secure web browsing - The OS approach

Many of the vulnerabilities of today’s web browsers are a consequence of the enormously evolved web. There is a significant difference in how the web is used today as opposed to 15 years ago, when the first browsers were created. Back then browsers were designed to render static web pages with no or little media content. Today’s web pages use a lot of different media content through plugins lik...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Architecture and Code Optimization

سال: 2009

ISSN: 1544-3566,1544-3973

DOI: 10.1145/1498690.1498691