HOME
SEARCH
RSS FEED
SUBSCRIBE
Search Results - Cybersecurity
2
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Object Flow Integrity: A Method of Securing Binary Software Against Hijacking Attacks on Object-Oriented Systems
The University of Texas at Dallas is seeking partners interested in broadening the software security technique of control-flow integrity (CFI) to support a much larger class of target application programs and architectures while further enhancing the security capabilities. Object Flow Integrity (OFI) is the first work to safely support inter-module...
Published: 4/26/2019
|
Inventor(s):
Kevin Hamlen
Keywords(s):
Computer
,
Electronics
,
Engineering & Physical Sciences
,
Internet of Things (IoT)
,
Software
Category(s):
Cybersecurity
,
Diagnostics
,
IT & Networking
Automatically Bridging the Semantic Gap in Virtual Machine Introspection
This invention encompasses a set of techniques to automatically bridge the semantic gap in virtual machine introspection thus allowing a trusted machine to inspect other machines (physical or virtual) safely, quickly, and reliably.Background:In Cloud Computing, a secure (“trusted”) virtual machine is often used to monitor (“introspect”)...
Published: 4/26/2019
|
Inventor(s):
Zhiqiang Lin
Keywords(s):
Cloud Computing
,
Communications
,
Electronics
,
Internet of Things (IoT)
,
Research Tools
,
Software
,
Wireless
Category(s):
Diagnostics
,
Cybersecurity