Published Telecommunications Program Execution at Run-Time Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. Can be easily retrofitted to an existing microprocessor. By Binghamton University
Published Power & Utilities Authenticate Remote Execution Generates control flow signature and performs authentication incrementally, reducing the time between execution and authentication. By Binghamton University
Published Software & Platforms Validating Program Execution Fast validation of programs as they execute with very little performance overhead. Mechanism fits easily into existing hardware/software designs. By Binghamton University
Published Telecommunications Control Flow Signatures Enables the tampering of a program to be detected as the program executes. Fast validation of programs as they execute with very little performance overhead. By Binghamton University
Published Manufacturing & Production Flexible Electronic Devices Entire process is at low cost and low temperature with minimal environmental footprint By Binghamton University
Published Security Data Storage Security A novel data security framework that provides a triple layer of out-of-order “divide and store” protection. By Binghamton University