Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...