The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 5651859-n
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783639027839
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9783639027839
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 5651859
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9783639027839_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
Paperback. Zustand: New. Bestandsnummer des Verkäufers 6666-IUK-9783639027839
Anzahl: 10 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 5651859-n
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 5651859
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New. The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded syste. Bestandsnummer des Verkäufers 4950676
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process. Bestandsnummer des Verkäufers 9783639027839
Anzahl: 2 verfügbar