Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Promptcare: Prompt copyright protection by watermark injection and verification
Large language models (LLMs) have witnessed a meteoric rise in popularity among the
general public users over the past few months, facilitating diverse downstream tasks with …
general public users over the past few months, facilitating diverse downstream tasks with …
You shall not (by) pass! practical, secure, and fast pku-based sandboxing
Memory Protection Keys for Userspace (PKU) is a recent hardware feature that allows
programs to assign virtual memory pages to protection domains, and to change domain …
programs to assign virtual memory pages to protection domains, and to change domain …
Ultimate {SLH}: Taking speculative load hardening to the next level
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures.
Specifically, we systematically investigate the performance penalty and security properties of …
Specifically, we systematically investigate the performance penalty and security properties of …
Vdom: Fast and unlimited virtual domains on multiple architectures
Hardware memory domain primitives, such as Intel MPK and ARM Memory Domain, have
been used for efficient in-process memory isolation. However, they can only provide a …
been used for efficient in-process memory isolation. However, they can only provide a …
Capacity: Cryptographically-enforced in-process capabilities for modern arm architectures
In-process compartmentalization and access control have been actively explored to provide
in-place and efficient isolation of in-process security domains. Many works have proposed …
in-place and efficient isolation of in-process security domains. Many works have proposed …
Panic: Pan-assisted intra-process memory isolation on arm
Intra-process memory isolation is a well-known technique to enforce least privilege within a
process. In this paper, we propose a generic and efficient intra-process memory isolation …
process. In this paper, we propose a generic and efficient intra-process memory isolation …
SoK: Software Compartmentalization
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
Rewind & Discard: Improving software resilience using isolated domains
Well-known defenses exist to detect and mitigate common faults and memory safety
vulnerabilities in software. Yet, many of these mitigations do not address the challenge of …
vulnerabilities in software. Yet, many of these mitigations do not address the challenge of …
Friend or foe inside? exploring in-process isolation to maintain memory safety for unsafe rust
Rust is a popular memory-safe systems programming language. In order to interact with
hardware or call into non-Rust libraries, Rust provides unsafe language features that shift …
hardware or call into non-Rust libraries, Rust provides unsafe language features that shift …
ThreadLock: Native Principal Isolation Through Memory Protection Keys
Inter-process isolation has been deployed in operating systems for decades, but secure intra-
process isolation remains an active research topic. Achieving secure intra-process isolation …
process isolation remains an active research topic. Achieving secure intra-process isolation …