{SHELTER}: Extending Arm {CCA} with Isolation in User Space
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …
seamless interaction with numerous mobile and server devices. TrustZone is a promising …
{PET}: Prevent discovered errors from being triggered in the linux kernel
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …
Ripple: Profile-guided instruction cache replacement for data center applications
Modern data center applications exhibit deep software stacks, resulting in large instruction
footprints that frequently cause instruction cache misses degrading performance, cost, and …
footprints that frequently cause instruction cache misses degrading performance, cost, and …
Automated bug hunting with data-driven symbolic root cause analysis
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …
defenders now employ proactive defenses, namely software bug hunting, alongside existing …
R3: Record-Replay-Retroaction for Database-Backed Applications
Developers would benefit greatly from time travel: being able to faithfully replay past
executions and retroactively execute modified code on past events. Currently, replay and …
executions and retroactively execute modified code on past events. Currently, replay and …
ECMO: Peripheral transplantation to Rehost embedded Linux kernels
Dynamic analysis based on the full-system emulator QEMU is widely used for various
purposes. However, it is challenging to run firmware images of embedded devices in QEMU …
purposes. However, it is challenging to run firmware images of embedded devices in QEMU …
HYPERFUZZER: An efficient hybrid fuzzer for virtual cpus
In this cloud computing era, the security of hypervisors is critical to the overall security of the
cloud. In particular, the security of CPU virtualization in hypervisors is paramount because it …
cloud. In particular, the security of CPU virtualization in hypervisors is paramount because it …
Hyperdbg: Reinventing hardware-assisted debugging
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …
software industry. Efficient and stealthy debuggers are especially relevant for malware …
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features
Failure diagnosis in practical systems is difficult, and the main obstacle is that the
information a developer has access to is limited. This information is usually not enough to …
information a developer has access to is limited. This information is usually not enough to …
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
Linux-based hypervisors in the cloud server suffer from an increasing number of
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …
vulnerabilities in the Linux kernel. To address these vulnerabilities in a timely manner while …