Profils utilisateurs correspondant à "Lauren Biernacki"
Lauren BiernackiAssistant Professor of Electrical Engineering and Computer Science Adresse e-mail validée de lafayette.edu Cité 141 fois |
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn
Attacks often succeed by abusing the gap between program and machine-level semantics--
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data, …
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data, …
Morpheus II: A RISC-V security extension for protecting vulnerable software and hardware
Morpheus II is a secure processor designed to prevent control flow attacks. Morpheus II
strengthens the defenses of the Morpheus [1] processor, by deploying always-on encryption to …
strengthens the defenses of the Morpheus [1] processor, by deploying always-on encryption to …
Security Verification of Low-Trust Architectures
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and
significantly reduce the amount of hardware trust to a small software-free enclave component…
significantly reduce the amount of hardware trust to a small software-free enclave component…
Vip-bench: a benchmark suite for evaluating privacy-enhanced computation frameworks
L Biernacki, MZ Demissie, KB Workneh… - … on Secure and …, 2021 - ieeexplore.ieee.org
Privacy-enhanced computation enables the processing of encrypted data without exposing
underlying sensitive information. Such technologies are extremely promising for the …
underlying sensitive information. Such technologies are extremely promising for the …
Software-driven security attacks: From vulnerability sources to durable hardware defenses
There is an increasing body of work in the area of hardware defenses for software-driven
security attacks. A significant challenge in developing these defenses is that the space of …
security attacks. A significant challenge in developing these defenses is that the space of …
Exploring the Efficiency of Data-Oblivious Programs
L Biernacki, BM Tiruye, MZ Demissie… - … Analysis of Systems …, 2023 - ieeexplore.ieee.org
Data-oblivious programs have gained popularity due to their application in security, but are
often dismissed because of anticipated performance loss. In order to better understand these …
often dismissed because of anticipated performance loss. In order to better understand these …
Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy
L Biernacki, MZ Demissie, KB Workneh… - … on Secure and …, 2022 - ieeexplore.ieee.org
Data breaches that penetrate web-facing servers and exfiltrate sensitive user data have
become pervasive. Insulating these systems from attack is seemingly impossible due to the …
become pervasive. Insulating these systems from attack is seemingly impossible due to the …
Special Session: Detecting and Defending Vulnerabilities in Heterogeneous and Monolithic Systems: Current Strategies and Future Directions
…, M Demissie, T Austin, L Biernacki… - … , and Synthesis for …, 2024 - ieeexplore.ieee.org
Embedded systems are evolving in complexity, leading to the emergence of multiple threats.
The co-design and execution of software on the embedded systems further exacerbate the …
The co-design and execution of software on the embedded systems further exacerbate the …
Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage
During the 1970s, a curious class of programs called data-oblivious algorithms started to
catch the attention of researchers because of the numerous applications they enabled due to …
catch the attention of researchers because of the numerous applications they enabled due to …
Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces
To maintain the control-flow integrity of today's machines, code pointers must be protected.
Exploits forge and manipulate code pointers to execute arbitrary, malicious code on a host …
Exploits forge and manipulate code pointers to execute arbitrary, malicious code on a host …