Attack and Defense with Hardware-Aided Security
dc.contributor.author | Zhang, Ning | en |
dc.contributor.committeechair | Lou, Wenjing | en |
dc.contributor.committeemember | Chen, Ing-Ray | en |
dc.contributor.committeemember | Yao, Danfeng (Daphne) | en |
dc.contributor.committeemember | Sun, Kun | en |
dc.contributor.committeemember | Hou, Yiwei Thomas | en |
dc.contributor.committeemember | Shi, Elaine | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2016-08-27T08:00:21Z | en |
dc.date.available | 2016-08-27T08:00:21Z | en |
dc.date.issued | 2016-08-26 | en |
dc.description.abstract | Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these technologies brings great value to our daily life, the lucrative reward from cyber-crimes has also attracted criminals. As computing continues to play an increasing role in the society, security has become a pressing issue. Failures in computing systems could result in loss of infrastructure or human life, as demonstrated in both academic research and production environment. With the continuing widespread of malicious software and new vulnerabilities revealing every day, protecting the heterogeneous computing systems across the Internet has become a daunting task. Our approach to this challenge consists of two directions. The first direction aims to gain a better understanding of the inner working of both attacks and defenses in the cyber environment. Meanwhile, our other direction is designing secure systems in adversarial environment. | en |
dc.description.degree | Ph. D. | en |
dc.format.medium | ETD | en |
dc.identifier.other | vt_gsexam:8733 | en |
dc.identifier.uri | http://hdl.handle.net/10919/72855 | en |
dc.publisher | Virginia Tech | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Trusted Execution Environment | en |
dc.subject | Hardware-Assisted Security | en |
dc.subject | Secure Execution | en |
dc.subject | Cache | en |
dc.subject | Rootkit | en |
dc.title | Attack and Defense with Hardware-Aided Security | en |
dc.type | Dissertation | en |
thesis.degree.discipline | Computer Science and Applications | en |
thesis.degree.grantor | Virginia Polytechnic Institute and State University | en |
thesis.degree.level | doctoral | en |
thesis.degree.name | Ph. D. | en |
Files
Original bundle
1 - 1 of 1