{SHELTER}: Extending Arm {CCA} with Isolation in User Space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

{PET}: Prevent discovered errors from being triggered in the linux kernel

Z Wang, Y Chen, Q Zeng - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …

Ripple: Profile-guided instruction cache replacement for data center applications

TA Khan, D Zhang, A Sriraman… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Modern data center applications exhibit deep software stacks, resulting in large instruction
footprints that frequently cause instruction cache misses degrading performance, cost, and …

Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …

R3: Record-Replay-Retroaction for Database-Backed Applications

Q Li, P Kraft, M Cafarella, Ç Demiralp… - Proceedings of the …, 2023 - dl.acm.org
Developers would benefit greatly from time travel: being able to faithfully replay past
executions and retroactively execute modified code on past events. Currently, replay and …

ECMO: Peripheral transplantation to Rehost embedded Linux kernels

M Jiang, L Ma, Y Zhou, Q Liu, C Zhang… - Proceedings of the …, 2021 - dl.acm.org
Dynamic analysis based on the full-system emulator QEMU is widely used for various
purposes. However, it is challenging to run firmware images of embedded devices in QEMU …

HYPERFUZZER: An efficient hybrid fuzzer for virtual cpus

X Ge, B Niu, R Brotzman, Y Chen, HS Han… - Proceedings of the …, 2021 - dl.acm.org
In this cloud computing era, the security of hypervisors is critical to the overall security of the
cloud. In particular, the security of CPU virtualization in hypervisors is paramount because it …

Hyperdbg: Reinventing hardware-assisted debugging

MS Karvandi, MH Gholamrezaei… - Proceedings of the …, 2022 - dl.acm.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features

Y Zhang, Y Hu, H Li, W Shi, Z Ning, X Luo… - Proceedings of the 32nd …, 2023 - dl.acm.org
Failure diagnosis in practical systems is difficult, and the main obstacle is that the
information a developer has access to is limited. This information is usually not enough to …

FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor

Z Ye, L Zhou, F Zhang, W **, Z Ning, Y Hu… - Proceedings of the 33rd …, 2024 - dl.acm.org
Linux-based hypervisors in the cloud server suffer from an increasing number of
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …