Search Results - cybersecurity

3 Results Sort By:
Cyber Risk Loss Modeling for Drone Delivery Systems
Background Commercial drone delivery systems are increasingly used, particularly in the US and in China, with over 2000 deliveries occurring in 2022. Drone delivery systems have many advantages over conventional delivery systems, including lower costs, faster deliveries, and increased energy efficiency. However, drone delivery systems can lead to increased...
Published: 5/20/2025   |   Inventor(s): Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier
Keywords(s):  
Category(s): Wireless & Networking, Artificial Intelligence/Machine Learning, Applied Technologies, Cybersecurity
Object Flow Integrity: A Method of Securing Binary Software Against Hijacking Attacks on Object-Oriented Systems
The University of Texas at Dallas is seeking partners interested in broadening the software security technique of control-flow integrity (CFI) to support a much larger class of target application programs and architectures while further enhancing the security capabilities. Object Flow Integrity (OFI) is the first work to safely support inter-module...
Published: 4/26/2019   |   Inventor(s): Kevin Hamlen
Keywords(s): Computer, Electronics, Engineering & Physical Sciences, Internet of Things (IoT), Software
Category(s): Cybersecurity, Diagnostics, IT & Networking
Automatically Bridging the Semantic Gap in Virtual Machine Introspection
This invention encompasses a set of techniques to automatically bridge the semantic gap in virtual machine introspection thus allowing a trusted machine to inspect other machines (physical or virtual) safely, quickly, and reliably.Background:In Cloud Computing, a secure (“trusted”) virtual machine is often used to monitor (“introspect”)...
Published: 4/26/2019   |   Inventor(s): Zhiqiang Lin
Keywords(s): Cloud Computing, Communications, Electronics, Internet of Things (IoT), Research Tools, Software, Wireless
Category(s): Diagnostics, Cybersecurity