Continuous run-time validation of program execution: a practical approach

K Ghose - US Patent 9,767,284, 2017 - Google Patents
Trustworthy systems require that code be validated as genuine. Most systems implement this
requirement prior to execution by matching a cryptographic hash of the binary file against a …

Continuous, low overhead, run-time validation of program executions

E Aktas, F Afram, K Ghose - 2014 47th Annual IEEE/ACM …, 2014 - ieeexplore.ieee.org
The construction of trustworthy systems demands that the execution of every piece of code is
validated as genuine, that is, the executed codes do exactly what they are supposed to do …

Design of a vision system for identity verification

M Tistarelli, A Lagorio, M Jentile… - Proceedings of the 32nd …, 1999 - ieeexplore.ieee.org
The use of biometric data for automated identity verification, is one of the major challenges
in many application domains. This is certainly a formidable task which requires the …

RAS 오염 방지를 통한 함수 복귀 예측 정확도 향상

김주환, 곽종욱, 장성태, 전주식 - 전자공학회논문지-CI, 2011 - dbpia.co.kr
조건 분기 명령어의 예측 정확도가 매우 높아짐에 따라 상대적으로 무조건 분기 명령어의
예측이 중요해지고 있다. 그 중 RAS (Return Address Stack) 를 사용하는 함수 복귀 예측은 …

Prediction Accuracy Enhancement of Function Return Address via RAS Pollution Prevention

JH Kim, JW Kwak, ST Jhang… - Journal of the Institute of …, 2011 - koreascience.kr
As the prediction accuracy of conditional branch instruction is increased highly, the
importance of prediction accuracy for unconditional branch instruction is also increased …

[TRÍCH DẪN][C] theory. My primary interests are in cyber security, especially in the context of CPSes and IoTs.

H Lin