Hacker News new | past | comments | ask | show | jobs | submit login

First that was easier than AEGIS was SP/Bastion:

http://palms.ee.princeton.edu/sp_bastion

SecureME's cloaking was interesting:

https://docs.google.com/file/d/0B1i_Zf52vJctMTA4YTI1MmUtNzdj...

HIDE - an infrastructure for efficiently protecting information leakage on the address bus http://www.cc.gatech.edu/people/home/santosh/papers/asplos20...

Using address independent seed encryption and bonsai Merkle Trees to make secure processors OS- and performance-friendly http://www.ece.ncsu.edu/arpers/Papers/micro07-brian.pdf

Embedded Software Security through Key-Based Control Flow Obfuscation http://engr.case.edu/bhunia_swarup/papers/C/C80.pdf

Memory encryption: Survey of Existing Techniques http://www.thayer.dartmouth.edu/tr/reports/tr13-001.pdf

ASIST - architecture support for instruction set randomization http://www.ics.forth.gr/_publications/papadog-asist-ccs.pdf

Hardware architectures for software security http://scholar.lib.vt.edu/theses/available/etd-10112006-2048...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: