STP/HAMPI and Computer Security
نویسنده
چکیده
In the past several years I have written two SMT solvers called STP and HAMPI that have found widespread use in computer security research by leading groups in academia, industry and the government. In this note I summarize the features of STP/HAMPI that make them particularly suited for computer security research, and a brief description of some of the more important projects that use them.
منابع مشابه
Tessellation: Space-Time Partitioning in a Manycore Client OS∗
We argue for space-time partitioning (STP) in manycore operating systems. STP divides resources such as cores, cache, and network bandwidth amongst interacting software components. Components are given unrestricted access to their resources and may schedule them in an application-specific fashion, which is critical for good parallel application performance. Components communicate via messages, ...
متن کاملA Provably Secure PKCS#11 Configuration Without Authenticated Attributes
Cryptographic APIs like PKCS#11 are interfaces to trusted hardware where keys are stored; the secret keys should never leave the trusted hardware in plaintext. In PKCS#11 it is possible to give keys conflicting roles, leading to a number of key-recovery attacks. To prevent these attacks, one can authenticate the attributes of keys when wrapping, but this is not standard in PKCS#11. Alternativel...
متن کاملStraight through Processing Technology in Global Financial Market: Readiness Assessment and Implementation
With rising trading volumes in domestic and cross-border security transactions, risks faced by global financial firms and markets are increasing. To manage settlement risks and maintain competitiveness in global financial markets, the U.S. Security and Exchange Commission (SEC) has decided to shorten the settlement cycle of security transactions from the current T+3 to T+1. As a result, key pla...
متن کاملSpanning Tree Protocol and Ethernet PAUSE Frames DDoS Attacks: Their Efficient Mitigation
Making protocols at layer 2 of the OSI model less vulnerable against computational attacks has become essential. They represent a great percentage of attacks being originated within the organization. Recently, several attacks using Ethernet PAUSE frames in combination with well known Spanning Tree Protocol (STP) attacks have been reported. We believe that STP can be properly configured and cont...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1204.2989 شماره
صفحات -
تاریخ انتشار 2012