Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

A new era in llm security: Exploring security concerns in real-world llm-based systems

F Wu, N Zhang, S Jha, P McDaniel, C **ao - arxiv preprint arxiv …, 2024 - arxiv.org
Large Language Model (LLM) systems are inherently compositional, with individual LLM
serving as the core foundation with additional layers of objects such as plugins, sandbox …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

Ethainter: a smart contract security analyzer for composite vulnerabilities

L Brent, N Grech, S Lagouvardos, B Scholz… - Proceedings of the 41st …, 2020 - dl.acm.org
Smart contracts on permissionless blockchains are exposed to inherent security risks due to
interactions with untrusted entities. Static analyzers are essential for identifying security risks …

Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

NetKAT: Semantic foundations for networks

CJ Anderson, N Foster, A Guha, JB Jeannin… - Acm sigplan …, 2014 - dl.acm.org
Recent years have seen growing interest in high-level languages for programming
networks. But the design of these languages has been largely ad hoc, driven more by the …

Digital twins, big data governance, and sustainable tourism

E Rahmadian, D Feitosa, Y Virantina - Ethics and Information Technology, 2023 - Springer
The rapid adoption of digital technologies has revolutionized business operations and
introduced emerging concepts such as Digital Twin (DT) technology, which has the potential …