Heterogeneous isolated execution for commodity gpus

I Jang, A Tang, T Kim, S Sethumadhavan… - Proceedings of the …, 2019 - dl.acm.org
Traditional CPUs and cloud systems based on them have embraced the hardware-based
trusted execution environments to securely isolate computation from malicious OS or …

Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints

D Song, F Hetzelt, J Kim, BB Kang, JP Seifert… - 29th USENIX Security …, 2020 - usenix.org
Kernel-mode drivers are challenging to analyze for vulnerabilities, yet play a critical role in
maintaining the security of OS kernels. Their wide attack surface, exposed via both the …

A study of modern Linux API usage and compatibility: what to support when you're supporting

CC Tsai, B Jain, NA Abdul, DE Porter - Proceedings of the Eleventh …, 2016 - dl.acm.org
This paper presents a study of Linux API usage across all applications and libraries in the
Ubuntu Linux 15.04 distribution. We propose metrics for reasoning about the importance of …

[หนังสือ][B] Cloud computing security: foundations and challenges

JR Vacca - 2020 - books.google.com
This handbook offers a comprehensive overview of cloud computing security technology
and implementation while exploring practical solutions to a wide range of cloud computing …

vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware

J Qiu, Z Zhou, Y Li, Z Li, F Qian, H Lin, D Gao… - Proceedings of the …, 2024 - dl.acm.org
Emerging mobile apps such as UHD video and AR/VR access diverse high-throughput
hardware devices, eg, video codecs, cameras, and image processors. However, today's …

Dancing with giants: Wimpy kernels for on-demand isolated i/o

Z Zhou, M Yu, VD Gligor - 2014 IEEE symposium on security …, 2014 - ieeexplore.ieee.org
To be trustworthy, security-sensitive applications must be formally verified and hence small
and simple, ie, wimpy. Thus, they cannot include a variety of basic services available only in …

Hector: Detecting resource-release omission faults in error-handling code for systems software

S Saha, JP Lozi, G Thomas, JL Lawall… - 2013 43rd Annual …, 2013 - ieeexplore.ieee.org
Omitting resource-release operations in systems error handling code can lead to memory
leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of …

Printfuzz: Fuzzing linux drivers via automated virtual device simulation

Z Ma, B Zhao, L Ren, Z Li, S Ma, X Luo… - Proceedings of the 31st …, 2022 - dl.acm.org
Linux drivers share the same address space and privilege with the core of the kernel but
have a much larger code base and attack surface. The Linux drivers are not well tested and …

Open data kit sensors: a sensor integration framework for android at the application-level

W Brunette, R Sodt, R Chaudhri, M Goel… - Proceedings of the 10th …, 2012 - dl.acm.org
Smartphones can now connect to a variety of external sensors over wired and wireless
channels. However, ensuring proper device interaction can be burdensome, especially …

Semantic-informed driver fuzzing without both the hardware devices and the emulators

W Zhao, K Lu, Q Wu, Y Qi - Network and Distributed Systems Security …, 2022 - par.nsf.gov
Device drivers are security-critical. In monolithic kernels like Linux, there are hundreds of
thousands of drivers which run in the same privilege as the core kernel. Consequently, a …