The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process.
"Sinopsis" puede pertenecer a otra edición de este libro.
The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 5651859-n
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9783639027839
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9783639027839
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 5651859
Cantidad disponible: Más de 20 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9783639027839_new
Cantidad disponible: Más de 20 disponibles
Librería: Chiron Media, Wallingford, Reino Unido
Paperback. Condición: New. Nº de ref. del artículo: 6666-IUK-9783639027839
Cantidad disponible: 10 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: New. Nº de ref. del artículo: 5651859-n
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 5651859
Cantidad disponible: Más de 20 disponibles
Librería: moluna, Greven, Alemania
Kartoniert / Broschiert. Condición: New. The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded syste. Nº de ref. del artículo: 4950676
Cantidad disponible: Más de 20 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Neuware - The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process. Nº de ref. del artículo: 9783639027839
Cantidad disponible: 2 disponibles