End-to-end encrypted relational database management systems are the “holy grail” of database security and have been studied by the research community for the last 20 …
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since …
The adoption of cloud services is on the rise, with both personal and corporate data being stored on third-party server databases. In order to protect …
This thesis addresses the problem of memory safety in the Linux kernel. Despite many memory isolation, control-flow integrity, and code diversification techniques existing both in …
Software is becoming increasingly complex. To keep up with evolving applications, modern operating systems (OSes) provide a rich and continually-growing set of features through OS …
As the volume and complexity of generated data grow, users would like to maintain the ability to issue expressive queries on their data without sacrificing …
An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent …