Debug/optimize/secure

Latest Innovations

A Systematic Approach to Uncover Security Flaws in GUI Logic

 

Website spoofing, or phishing, is a serious problem targeting online user information. It can be used to steal usernames and passwords from important websites such...

iWatcher: Simple and General Architectural Support for Software Debugging

 

 

Methods and systems for memory monitoring. A triggering access is detected at one or more monitored memory regions. When a triggering access is detected, a...

Application Level Hardware Tracing for Scaling Post-Silicon Debug

Dr. Vasudevan from the University of IL has developed an advanced algorithm for optimizing design-for-debug hardware. This algorithm takes advantage of high level...

Robust Obfuscation of Encrypted DNS Traffic against Advanced Traffic Analysis Attacks

The Domain Name System (DNS) introduced in 1985 has been a security risk because it allowed internet users' online browsing activities to be tracked and analyzed. Despite...