Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Tag: Tagged architecture guide
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …
researchers and attackers. Hardware solutions based on tagging are emerging as a …
Architectural support for software-defined metadata processing
Optimized hardware for propagating and checking software-programmable metadata tags
can achieve low runtime overhead. We generalize prior work on hardware tagging by …
can achieve low runtime overhead. We generalize prior work on hardware tagging by …
Efficient tagged memory
We characterize the cache behavior of an in-memory tag table and demonstrate that an
optimized implementation can typically achieve a near-zero memory traffic overhead. Both …
optimized implementation can typically achieve a near-zero memory traffic overhead. Both …
Security tagging for a zero-kernel operating system
Hardware-based security tagging schemes are promising mechanisms for enhancing the
security of computer systems. The idea behind security tagging schemes is to attach labels …
security of computer systems. The idea behind security tagging schemes is to attach labels …
High-performance memory safety: optimizing the CHERI capability machine
AJP Joannou - 2019 - cl.cam.ac.uk
High-performance memory safety: optimizing the CHERI capability machine Page 1 Technical
Report Number 936 Computer Laboratory UCAM-CL-TR-936 ISSN 1476-2986 High-performance …
Report Number 936 Computer Laboratory UCAM-CL-TR-936 ISSN 1476-2986 High-performance …
Taxi: Defeating code reuse attacks with tagged memory
JA González - 2015 - dspace.mit.edu
The rise of code reuse attacks has been devastating for users of languages like C and C++
that lack memory safety. We survey existing defenses to understand why none are generally …
that lack memory safety. We survey existing defenses to understand why none are generally …
[PDF][PDF] TAG: Tagged Architecture Guide
H SHROBE - ACM Comput. Surv, 2022 - sjero.net
Authors' addresses: Samuel Jero, samuel. jero@ ll. mit. edu; Nathan Burow, nathan.
burow@ ll. mit. edu; Bryan Ward, bryan. ward@ ll. mit. edu; Richard Skowyra, richard …
burow@ ll. mit. edu; Bryan Ward, bryan. ward@ ll. mit. edu; Richard Skowyra, richard …
Security Tagged Architectures and Systems
G Yuksek - 2024 - search.proquest.com
Control flow attacks exploit software vulnerabilities to divert the flow of control into
unintended paths such that the program behavior is altered to ultimately execute the code …
unintended paths such that the program behavior is altered to ultimately execute the code …
High-performance memory safety-Optimizing the CHERI capability machine
AJMP Joannou - 2018 - repository.cam.ac.uk
High-performance memory safety Optimizing the CHERI capability machine Alexandre Jean-Michel
Procopi Joannou University of Cambr Page 1 High-performance memory safety Optimizing the …
Procopi Joannou University of Cambr Page 1 High-performance memory safety Optimizing the …