Search Results - Cybersecurity

2 Results Sort By:
Object Flow Integrity: A Method of Securing Binary Software Against Hijacking Attacks on Object-Oriented Systems
The University of Texas at Dallas is seeking partners interested in broadening the software security technique of control-flow integrity (CFI) to support a much larger class of target application programs and architectures while further enhancing the security capabilities. Object Flow Integrity (OFI) is the first work to safely support inter-module...
Published: 4/26/2019   |   Inventor(s): Kevin Hamlen
Keywords(s): Computer, Electronics, Engineering & Physical Sciences, Internet of Things (IoT), Software
Category(s): Cybersecurity, Diagnostics, IT & Networking
Automatically Bridging the Semantic Gap in Virtual Machine Introspection
This invention encompasses a set of techniques to automatically bridge the semantic gap in virtual machine introspection thus allowing a trusted machine to inspect other machines (physical or virtual) safely, quickly, and reliably.Background:In Cloud Computing, a secure (“trusted”) virtual machine is often used to monitor (“introspect”)...
Published: 4/26/2019   |   Inventor(s): Zhiqiang Lin
Keywords(s): Cloud Computing, Communications, Electronics, Internet of Things (IoT), Research Tools, Software, Wireless
Category(s): Diagnostics, Cybersecurity