Security Research - Past Projects
- Bluebox:Policy-Driven Intrusion Avoidance System
- Caernarvon: A Secure, High Assurance Operating System for Smart Cards
- E-Check
- Feedback-Driven Automated Security Testing
- Hypervisor Security Architecture (sHype)
- Identity 2.0
- Integrated Security Context Management
- Integrity Measurement Architecture (IMA)
- IPSec and IKE
- Language-based Security: Java, PHP
- Linux for the 4758 Secure Coprocessor
- Linux Security Analysis Tools (VALI)
- Matchbox
- Pseudonymity
- Secure Co-Processors
- Secure Identity Tokens
- Secure DNS
- Secure Internet Multicast
- Security for Pervasive Computing Applications
- Security for SOA infrastructure
- Security for a Software as a Service architecture
- Security for System S & FuzzyMLS
- Security Services in Virtualized Environments
- Sentry: Tivoli Compliance and Remediation
- Side-channel Cryptanalysis
- Trojan detection in Integrated Cicuits
- Trusted Virtual Data Center (TVDc)
- Trusted Virtual Domains (TVD)
- Virtual Trusted Platform Module (vTPM)
- Web 2.0