{"id":26,"date":"2017-06-23T04:08:17","date_gmt":"2017-06-23T04:08:17","guid":{"rendered":"http:\/\/mooney.gatech.edu\/security\/?page_id=26"},"modified":"2023-06-01T15:23:43","modified_gmt":"2023-06-01T19:23:43","slug":"projects","status":"publish","type":"page","link":"https:\/\/mooney.gatech.edu\/security\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<h2>Ongoing Projects<\/h2>\n<h3><a href=\"https:\/\/mooney.gatech.edu\/security\/projects\/secure_computation\/\">Secure Computation on Insecure Devices<\/a><\/h3>\n<p><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-328\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation.png\" alt=\"\" width=\"535\" height=\"330\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation.png 2572w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation-300x185.png 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation-1024x633.png 1024w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation-768x474.png 768w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation-1536x949.png 1536w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/06\/securecomputation-2048x1265.png 2048w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/a><\/p>\n<h3><a href=\"http:\/\/mooney.gatech.edu\/security\/projects\/multi-party-remote-update-for-hardwaresoftware-systems\/\">Multi-Party Remote Update for Hardware\/Software Systems<\/a><\/h3>\n<p><a href=\"http:\/\/mooney.gatech.edu\/security\/projects\/multi-party-remote-update-for-hardwaresoftware-systems\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-155\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/secure_update.png\" alt=\"\" width=\"1280\" height=\"720\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/secure_update.png 1280w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/secure_update-300x169.png 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/secure_update-768x432.png 768w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/secure_update-1024x576.png 1024w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/p>\n<h2>Previous Projects<\/h2>\n<h3><a href=\"http:\/\/mooney.gatech.edu\/security\/projects\/signature-based-hardware-security\/\">Signature-Based Hardware Security<\/a><\/h3>\n<p><a href=\"http:\/\/mooney.gatech.edu\/security\/projects\/signature-based-hardware-security\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-69\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/sig_hw_sec.jpg\" alt=\"\" width=\"640\" height=\"360\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/sig_hw_sec.jpg 640w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/sig_hw_sec-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Hardware\/Software Real Time Operating System<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/mooney.gatech.edu\/codesign\/projects\/rtos\/images\/hwswrtos2.jpg\" width=\"472\" height=\"296\" \/><\/p>\n<p>Power Aware Computing<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/mooney.gatech.edu\/codesign\/projects\/pac\/images\/proj.gif\" width=\"1139\" height=\"763\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ongoing Projects Secure Computation on Insecure Devices Multi-Party Remote Update for Hardware\/Software Systems Previous Projects Signature-Based Hardware Security Hardware\/Software Real Time Operating System Power Aware Computing<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"folder":[],"class_list":["post-26","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":16,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":428,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/26\/revisions\/428"}],"wp:attachment":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/folder?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}