Configurable and secure system architectures


In this paper we introduce a novel approach for host protection based on a security subsystem for continuous monitoring and control of user applications. To enable a secure monitoring capability, a strict hardware separation is proposed, in combination with a signaling layer for monitoring and control. The paper presents our preliminary work, introducing some of the core ideas and discussing a few scenarios and applications. © 2010 IEEE.

Publication Title

Proceedings - 2nd Vaagdevi International Conference on Information Technology for Real World Problems, VCON 2010