- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
03100000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Yan, Mengjia (3)
-
Drean, Jules (2)
-
Behrens, Jonathan (1)
-
Bourgeat, Thomas (1)
-
Chen, Ang (1)
-
Cook, Jack (1)
-
Dai, Miles (1)
-
Devadas, Srinivas (1)
-
Emer, Joel (1)
-
Gomez-Garcia, Miguel (1)
-
Huang, Yibo (1)
-
Liu, Hongyi (1)
-
McCalpin, John (1)
-
Paccagnella, Ricardo (1)
-
Tsai, Lillian (1)
-
Xing, Jiarong (1)
-
Yang, Yuheng (1)
-
Zhuo, Danyang (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Hypervisors have played a critical role in cloud security, but they introduce a large trusted computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading has become an emerging trend, where privileged functions are sunk into specially-designed hardware devices (e.g., Amazon’s Nitro, AMD’s Pensando) for better security with closer-to-baremetal performance. In light of this trend, this project rearchitects a classic security task that is often relegated to the hypervisor, memory introspection, while only using widely-available devices. Remote direct memory introspection (RDMI) couples two types of commodity programmable devices in a novel defense platform. It uses RDMA NICs for efficient memory access and programmable network devices for efficient computation, both operating at ASIC speeds. RDMI also provides a declarative language for users to articulate the introspection task, and its compiler automatically lowers the task to the hardware substrate for execution. Our evaluation shows that RDMI can protect baremetal machines without requiring a hypervisor, introspecting kernel state and detecting rootkits at high frequency and zero CPU overhead.more » « less
-
Dai, Miles ; Paccagnella, Ricardo ; Gomez-Garcia, Miguel ; McCalpin, John ; Yan, Mengjia ( , 31st USENIX Security Symposium (USENIX Security 22))
-
Cook, Jack ; Drean, Jules ; Behrens, Jonathan ; Yan, Mengjia ( , 49th Annual International Symposium on Computer Architecture)
-
Bourgeat, Thomas ; Drean, Jules ; Yang, Yuheng ; Tsai, Lillian ; Emer, Joel ; Yan, Mengjia ( , IEEE/ACM International Symposium on Microarchitecture (MICRO))null (Ed.)