Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A Survey on Thwarting Memory Corruption in RISC-V
M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …
paramount to keep these systems secure. A threat plaguing these systems consists of …
ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS
Architecture specifications notionally define the fundamental interface between hardware
and software: the envelope of allowed behaviour for processor implementations, and the …
and software: the envelope of allowed behaviour for processor implementations, and the …
Cornucopia: Temporal safety for CHERI heaps
NW Filardo, BF Gutstein, J Woodruff… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Use-after-free violations of temporal memory safety continue to plague software systems,
underpinning many high-impact exploits. The CHERI capability system shows great promise …
underpinning many high-impact exploits. The CHERI capability system shows great promise …
A survey on risc-v security: Hardware and architecture
T Lu - arxiv preprint arxiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …
are the processing engines of smart IoT devices. For decades, these processors were …
CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment
The CHERI architecture allows pointers to be implemented as capabilities (rather than
integer virtual addresses) in a manner that is compatible with, and strengthens, the …
integer virtual addresses) in a manner that is compatible with, and strengthens, the …
Flexos: Towards flexible os isolation
At design time, modern operating systems are locked in a specific safety and isolation
strategy that mixes one or more hardware/software protection mechanisms (eg user/kernel …
strategy that mixes one or more hardware/software protection mechanisms (eg user/kernel …
{MTSan}: A Feasible and Practical Memory Sanitizer for Fuzzing {COTS} Binaries
Fuzzing has been widely adopted for finding vulnerabilities in programs, especially when
source code is not available. But the effectiveness and efficiency of binary fuzzing are …
source code is not available. But the effectiveness and efficiency of binary fuzzing are …
An introduction to CHERI
Abstract CHERI (Capability Hardware Enhanced RISC Instructions) extends conventional
processor Instruction-Set Architectures (ISAs) with architectural capabilities to enable fine …
processor Instruction-Set Architectures (ISAs) with architectural capabilities to enable fine …
Exploring C semantics and pointer provenance
The semantics of pointers and memory objects in C has been a vexed question for many
years. C values cannot be treated as either purely abstract or purely concrete entities: the …
years. C values cannot be treated as either purely abstract or purely concrete entities: the …
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process
K Nienhuis, A Joannou, T Bauereiss… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The root causes of many security vulnerabilities include a pernicious combination of two
problems, often regarded as inescapable aspects of computing. First, the protection …
problems, often regarded as inescapable aspects of computing. First, the protection …