Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthew Hoekstra is active.

Publication


Featured researches published by Matthew Hoekstra.


hardware and architectural support for security and privacy | 2013

Using innovative instructions to create trustworthy software solutions

Matthew Hoekstra; Reshma Lal; Pradeep M. Pappachan; Vinay Phegade; Juan Del Cuvillo

Software developers face a number of challenges when creating applications that attempt to keep important data confidential. Even with diligent attention paid to correct software design and implementation practices, secrets can still be exposed through a single flaw in any of the privileged code on the platform, code which may have been written by thousands of developers from hundreds of organizations throughout the world. Intel is developing innovative security technology which provides the ability for software developers to maintain control of the security of sensitive code and data by creating trusted domains within applications to protect critical information during execution and at rest. This paper will describe how this technology has been effectively used in lab exercises to protect private information in applications including enterprise rights management, video chat, trusted financial transactions, and others. Examples will include both protection of local processing and the establishment of secure communication with cloud services. It will illustrate useful software design patterns that can be followed to create many additional types of trusted software solutions.


trans. computational science | 2010

An analysis of secure processor architectures

Siddhartha Chhabra; Yan Solihin; Reshma Lal; Matthew Hoekstra

Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has become even harder with the emergence of hardware attacks where the attacker has physical access to the system and can bypass any software security mechanisms employed. To this end, researchers have proposed Secure Processor architectures that provide protection against hardware attacks using platform features. In this paper, we analyze three of the currently proposed secure uniprocessor designs in terms of their security, complexity of hardware required and performance overheads: eXecute Only Memory (XOM), Counter mode encryption and Merkle tree based authentication, and Address Independent Seed Encryption and Bonsai Merkle Tree based authentication. We then provide a discussion on the issues in securing multiprocessor systems and survey one design each for Shared Memory Multiprocessors and Distributed Shared Memory Multiprocessors. Finally, we discuss future directions in Secure Processor research which have largely been ignored forming the weakest link in the security afforded by the proposed schemes, namely, Secure booting and Secure configuration. We identify potential issues which can serve to form the foundation of further research in secure processors.


Archive | 1999

Automatic web site registration with multiple search engines

Matthew Hoekstra


Archive | 1999

Using an imaging device for security/emergency applications

Craig Langfahl; Matthew Hoekstra; Maynard C. Falconer


Archive | 2003

Method and apparatus for managing the privacy and disclosure of location information

James R. Trethewey; Dhananjay V. Keskar; Matthew Hoekstra; Uma M. Gadamsetty; Manoj Agnihotri


Archive | 2003

Dynamic detection of device characteristics

Dhananjay V. Keskar; Matthew Hoekstra


Archive | 2007

System partitioning to present software as platform level functionality

Stephen J. Tolopka; David A. Koufaty; John I. Garney; Yasser Rasheed; Ulhas Warrier; Matthew Hoekstra


Archive | 2003

Software-based problem-resolution production system with standardized information providers & solution interpreters

Matthew Hoekstra


Archive | 2014

TECHNIQUES FOR SECURING USE OF ONE-TIME PASSWORDS

Reshma Lal; Matthew Hoekstra


Archive | 2013

Policy-based trusted inspection of rights managed content

Jason Martin; Matthew Hoekstra

Researchain Logo
Decentralizing Knowledge