Published Security Data Storage Security A novel data security framework that provides a triple layer of out-of-order “divide and store” protection. By Binghamton University
Published Software & Platforms Virtual Machine Checkpointing A security and privacy aware checkpointing mechanism that enables users to selectively exclude processes and terminal applications that contain sensitive data By Binghamton University
Published Software & Platforms Out-of-order Data Division A novel, multi-layer distributed data security scheme that provides a triple layer of out-of-order “divide and store” protection of data By Binghamton University
Published Electronics Detection of Program Tampering A technology that enables the detection of tampering of a program as the program executes for security applications. By Binghamton University
Published Software & Platforms Preventing Software Weaknesses The processor described here provides specific hardware support to detect common types of software vulnerabilities or weaknesses that lead to security violations in computing. By Binghamton University
Published Engineering A Reliable Switch An integrated ‘smart’ device which combines the functions of a mass threshold value gas sensor and an electro-mechanical (MEMS) switch that actuates an alarm or defensive secur ... By Binghamton University