Mark Beaumont
Mark Beaumont
Defence Science & Technology Group
Verified email at dst.defence.gov.au - Homepage
Title
Cited by
Cited by
Year
Hardware trojans-prevention, detection, countermeasures (a literature review)
M Beaumont, B Hopkins, T Newby
DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA) COMMAND …, 2011
106*2011
Safer path: Security architecture using fragmented execution and replication for protection against trojaned hardware
M Beaumont, B Hopkins, T Newby
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
392012
Digital video guard
MRG Beaumont, CJG North, KK Yiu, JD Green
US Patent 8,572,403, 2013
212013
An overview of the Annex system
DA Grove, CA Owen, CJ North, JA Jones, MR Beaumont, BD Hopkins, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
202007
Stram: Measuring the trustworthiness of computer-based systems
JH Cho, S Xu, PM Hurley, M Mackay, T Benjamin, M Beaumont
ACM Computing Surveys (CSUR) 51 (6), 1-47, 2019
182019
The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface
M Beaumont, J McCarthy, T Murray
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
172016
Hardware Trojans-A Systemic Threat.
J Shield, BD Hopkins, MR Beaumont, CJ North
AISC, 45-51, 2015
92015
Hardware trojan resistant computation using heterogeneous COTS processors
M Beaumont, B Hopkins, T Newby
Proceedings of the Thirty-Sixth Australasian Computer Science Conference …, 2013
42013
Digital video guard
MRG Beaumont, CJG North, KK Yiu, JD Green
US Patent App. 14/041,416, 2014
32014
Hard disk guard based policy enforcement
M Beaumont, C North, B Hopkins, K Yiu
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
32011
Digital Video Guard.
M Beaumont, C North, J Green
32009
Cross domain desktop compositor
MR Beaumont
US Patent 10,671,414, 2020
12020
Information Associations for Multi-Domain Applications: Addressing Data Utility in Segregated Networks
J Shield, S Chenoweth, P Prendergast, M Beaumont, C North, B Hopkins
Proceedings of the Australasian Computer Science Week Multiconference, 1-11, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–13