no code implementations • 9 Dec 2019 • Rémi Denis-Courmont, Hans Liljestrand, Carlos Chinea, Jan-Erik Ekberg
Software control flow integrity (CFI) solutions have been applied to the Linux kernel for memory protection.
Cryptography and Security
no code implementations • 24 May 2019 • Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan
Software shadow stacks incur high overheads or trade off security for efficiency.
Cryptography and Security
1 code implementation • 25 May 2016 • Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices.
Cryptography and Security