Now showing items 1-2 of 2

    • Automatic Enforcement of Expressive Security Policies using Enclaves 

      Gollamudi, Anitha; Chong, Stephen N (2016-07-25)
      Hardware-based enclave protection mechanisms, such as Intel’s SGX, ARM’s TrustZone, and Apple’s Secure Enclave, can protect code and data from powerful low-level attackers. In this work, we use enclaves to enforce strong ...
    • Required Information Release 

      Chong, Stephen N (IOS Press, 2012)
      Many computer systems have a functional requirement to release information. Such requirements are an important part of a system's information security requirements. Current information-flow control techniques are able to ...