Learn More
Due to the widespread software piracy and virus attacks,significant efforts have been made to improve security forcomputer systems. For stand-alone computers, a key observationis that other than the processor, any component isvulnerable to security attacks. Recently, an execution onlymemory (XOM) architecture has been proposed to supportcopy and tamper(More)
—Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation is that, other than the processor, any component is vulnerable to security attacks. Recently, an execution only memory (XOM) architecture has been proposed to support copy and(More)
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of attacks. This paper proposes a security enhancement model called SENSS, that allows programs to run securely on a symmetric shared memory multiprocessor (SMP) environment. In SENSS,(More)
The Institute for Higher Education Policy is a nonprofi t, nonpartisan research organization whose mission is to foster access and success in postsecondary education through public policy research and other activities that inform and infl uence the policymaking process. These activities include policy reports and studies, seminars and meetings, and capacity(More)
OBJECTIVE To evaluate the clinical efficacy and safety of the newer antiepileptic drugs (AEDs), namely, Eslicarbazepine (ESL), Retigabine/Ezogabine (RTG), Carisbamate (CAR), Lacosamide (LAC), Brivaracetam (BRI) or Perampanel (PER) as adjunctive therapy for adults with partial-onset seizures (POS). METHODS A systematic review of Randomized(More)
Recently proposed trusted processor model is a promising model for building secure applications. While effective designs have been proposed for protecting data confidentiality and data integrity in such environments, an important security criterion -- user privacy is usually neglected in current designs. Due to the increasing concern of privacy protection(More)
Modern GPUs have shown promising results in accelerating computation intensive and numerical workloads with limited dynamic data sharing. However, many real-world applications manifest ample amount of data sharing among concurrently executing threads. Often data sharing requires mutual exclusion mechanism to ensure data integrity in multithreaded(More)
Due to the explosion of Internet technology in the last decade, there is an increasing demand for secure and effective streaming media protection (SMP) in the new computing environment. Since end users usually have the full control of their machines, pure software based approaches such as user/password validation and group key based content encryption, are(More)
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryption keys or proprietary algorithms. Addresses can be observed by attaching a hardware device on the bus that passively monitors the bus transaction. Such side-channel attacks(More)