Brian Delgado
YOU?
Author Swipe
View article: Blockchain Empowered Provenance Framework for Sensor Identity Management and Data Flow Security in Fossil-based Power Plants
Blockchain Empowered Provenance Framework for Sensor Identity Management and Data Flow Security in Fossil-based Power Plants Open
The overall goals of this project are divided into 3 important phases. First, a peer-to-peer SCADA network is to be established where identity profile of sensors from fossil-power plants will be stored in an immutable manner in order to ve…
View article: Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor
Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor Open
Recent years have seen a growing concern over System Management Mode (SMM) and its broad access to platform resources. The SMI Transfer Monitor (STM) is Intel’s most powerful executing CPU context. The STM is a firmware-based hypervisor th…
View article: Extensible Performance-Aware Runtime Integrity Measurement
Extensible Performance-Aware Runtime Integrity Measurement Open
Today's interconnected world consists of a broad set of online activities including banking, shopping, managing health records, and social media while relying heavily on servers to manage extensive sets of data. However, stealthy rootkit a…
View article: EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement
EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement Open
Runtime integrity measurements identify unexpected changes in operating systems and hypervisors during operation, enabling early detection of persistent threats. System Management Mode, a privileged x86 CPU mode, has the potential to effec…