The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process.
"synopsis" may belong to another edition of this title.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020185333
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783639027839
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783639027839
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783639027839
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783639027839_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New. Seller Inventory # 6666-IUK-9783639027839
Quantity: 10 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded syste. Seller Inventory # 4950676
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process. Seller Inventory # 9783639027839