Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Control-Flow Integrity: Attacks and Protections (2019)
Journal Article
Sayeed, S., Marco-Gisbert, H., Ripoll, I., & Birch, M. (2019). Control-Flow Integrity: Attacks and Protections. Applied Sciences, 9(20), Article 4229. https://doi.org/10.3390/app9204229

Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm... Read More about Control-Flow Integrity: Attacks and Protections.

DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network (2019)
Journal Article
Alsayed Kassem, J., Sayeed, S., Marco-Gisbert, H., Pervez, Z., & Dahal, K. (2019). DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network. Applied Sciences, 9(15), Article 2953. https://doi.org/10.3390/app9152953

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The pro... Read More about DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network.