Profils utilisateurs correspondant à "Lauren Biernacki"

Lauren Biernacki

Assistant Professor of Electrical Engineering and Computer Science
Adresse e-mail validée de lafayette.edu
Cité 141 fois

Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn

M Gallagher, L Biernacki, S Chen, ZB Aweke… - Proceedings of the …, 2019 - dl.acm.org
Attacks often succeed by abusing the gap between program and machine-level semantics--
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data, …

Morpheus II: A RISC-V security extension for protecting vulnerable software and hardware

A Harris, T Verma, S Wei, L Biernacki… - … Security and Trust …, 2021 - ieeexplore.ieee.org
Morpheus II is a secure processor designed to prevent control flow attacks. Morpheus II
strengthens the defenses of the Morpheus [1] processor, by deploying always-on encryption to …

Security Verification of Low-Trust Architectures

Q Tan, Y Fisseha, S Chen, L Biernacki… - Proceedings of the …, 2023 - dl.acm.org
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and
significantly reduce the amount of hardware trust to a small software-free enclave component…

Vip-bench: a benchmark suite for evaluating privacy-enhanced computation frameworks

L Biernacki, MZ Demissie, KB Workneh… - … on Secure and …, 2021 - ieeexplore.ieee.org
Privacy-enhanced computation enables the processing of encrypted data without exposing
underlying sensitive information. Such technologies are extremely promising for the …

Software-driven security attacks: From vulnerability sources to durable hardware defenses

L Biernacki, M Gallagher, Z Xu, MT Aga… - ACM Journal on …, 2021 - dl.acm.org
There is an increasing body of work in the area of hardware defenses for software-driven
security attacks. A significant challenge in developing these defenses is that the space of …

Exploring the Efficiency of Data-Oblivious Programs

L Biernacki, BM Tiruye, MZ Demissie… - … Analysis of Systems …, 2023 - ieeexplore.ieee.org
Data-oblivious programs have gained popularity due to their application in security, but are
often dismissed because of anticipated performance loss. In order to better understand these …

Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy

L Biernacki, MZ Demissie, KB Workneh… - … on Secure and …, 2022 - ieeexplore.ieee.org
Data breaches that penetrate web-facing servers and exfiltrate sensitive user data have
become pervasive. Insulating these systems from attack is seemingly impossible due to the …

Special Session: Detecting and Defending Vulnerabilities in Heterogeneous and Monolithic Systems: Current Strategies and Future Directions

…, M Demissie, T Austin, L Biernacki… - … , and Synthesis for …, 2024 - ieeexplore.ieee.org
Embedded systems are evolving in complexity, leading to the emergence of multiple threats.
The co-design and execution of software on the embedded systems further exacerbate the …

Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage

B Tiruye, L Biernacki, T Adem, P Mola… - 2024 IEEE Secure …, 2024 - ieeexplore.ieee.org
During the 1970s, a curious class of programs called data-oblivious algorithms started to
catch the attention of researchers because of the numerous applications they enabled due to …

Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces

L Biernacki, M Gallagher, V Bertacco… - … on Hardware Oriented …, 2020 - ieeexplore.ieee.org
To maintain the control-flow integrity of today's machines, code pointers must be protected.
Exploits forge and manipulate code pointers to execute arbitrary, malicious code on a host …