STP/HAMPI and Computer Security

نویسنده

  • Vijay Ganesh
چکیده

In the past several years I have written two SMT solvers called STP and HAMPI that have found widespread use in computer security research by leading groups in academia, industry and the government. In this note I summarize the features of STP/HAMPI that make them particularly suited for computer security research, and a brief description of some of the more important projects that use them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tessellation: Space-Time Partitioning in a Manycore Client OS∗

We argue for space-time partitioning (STP) in manycore operating systems. STP divides resources such as cores, cache, and network bandwidth amongst interacting software components. Components are given unrestricted access to their resources and may schedule them in an application-specific fashion, which is critical for good parallel application performance. Components communicate via messages, ...

متن کامل

A Provably Secure PKCS#11 Configuration Without Authenticated Attributes

Cryptographic APIs like PKCS#11 are interfaces to trusted hardware where keys are stored; the secret keys should never leave the trusted hardware in plaintext. In PKCS#11 it is possible to give keys conflicting roles, leading to a number of key-recovery attacks. To prevent these attacks, one can authenticate the attributes of keys when wrapping, but this is not standard in PKCS#11. Alternativel...

متن کامل

Straight through Processing Technology in Global Financial Market: Readiness Assessment and Implementation

With rising trading volumes in domestic and cross-border security transactions, risks faced by global financial firms and markets are increasing. To manage settlement risks and maintain competitiveness in global financial markets, the U.S. Security and Exchange Commission (SEC) has decided to shorten the settlement cycle of security transactions from the current T+3 to T+1. As a result, key pla...

متن کامل

Spanning Tree Protocol and Ethernet PAUSE Frames DDoS Attacks: Their Efficient Mitigation

Making protocols at layer 2 of the OSI model less vulnerable against computational attacks has become essential. They represent a great percentage of attacks being originated within the organization. Recently, several attacks using Ethernet PAUSE frames in combination with well known Spanning Tree Protocol (STP) attacks have been reported. We believe that STP can be properly configured and cont...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1204.2989  شماره 

صفحات  -

تاریخ انتشار 2012