Back to Results
First PageMeta Content
QEMU / Hyper-V / Hypervisor / Ring / Operating system / X86 / Xen / X Window System / System software / Software / Computer architecture


Poster: P ODA RCH: Protecting Legacy Applications with a Purely Hardware TCB Shweta Shinde1 , Shruti Tople1 , Deepak Kathayat2 , Prateek Saxena1 National University of Singapore1 , IIIT Hyderabad2 {shweta24, shruti90, pr
Add to Reading List

Document Date: 2015-05-11 16:42:30


Open Document

File Size: 181,46 KB

Share Result on Facebook

Company

Intel / /

Country

Singapore / /

/

Facility

Prateek Saxena1 National University of Singapore1 / We port / /

IndustryTerm

separate software stacks / software stack / x86 applications / checks completely in hardware / portable device / borrowed untrusted laptop device / process memory management / them without any hardware / software code / untrusted operating systems / untrusted cloud server / software prototype / trusted computing base / file utilities / memory allocation algorithms / legacy applications / vulnerable web servers / software component / memory management / /

OperatingSystem

Linux / GNU / /

Organization

Prime Ministers Office / Prateek Saxena1 National University of Singapore1 / National Research Foundation / Ministry of Education / National Cybersecurity R&D Directorate / /

Person

Bob Alice / ODA RCH CPU / Registers Fig / H. Shafi / V / /

Position

straight-forward / /

Technology

encryption / Linux / paging / secret key / operating system / SSL / operating systems / memory allocation algorithms / on-demand encryption / /

URL

http /

SocialTag