Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: Sgx. fail: How stuff gets exposed
S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …
protected from all software running on the machine. As such, numerous works have sought …
Assessing the impact of interface vulnerabilities in compartmentalized software
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …
only what they need. When compartmentalizing existing software, many approaches neglect …
{PET}: Prevent discovered errors from being triggered in the linux kernel
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …
Exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers
Information leaks are the most prevalent type of vulnerabilities among all known
vulnerabilities in Linux kernel. Many of them are caused by the use of uninitialized variables …
vulnerabilities in Linux kernel. Many of them are caused by the use of uninitialized variables …
{BoKASAN}: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing
Kernel Address Sanitizer (KASAN), an invaluable tool for finding use-after-free and out-of-
bounds bugs in the Linux kernel, needs the kernel source for compile-time instrumentation …
bounds bugs in the Linux kernel, needs the kernel source for compile-time instrumentation …
System Call Interposition Without Compromise
A Jacobs, M Gülmez, A Andries… - 2024 54th Annual …, 2024 - ieeexplore.ieee.org
Syscall interposition is crucial for tools that monitor/modify application behavior. Mainstream
OSes have, therefore, provided syscall interposition APIs for years, but these often incur …
OSes have, therefore, provided syscall interposition APIs for years, but these often incur …
dmvx: Secure and efficient multi-variant execution in a distributed setting
Multi-variant execution (MVX) systems amplify the effectiveness of software diversity
techniques. The key idea is to run multiple diversified program variants in lockstep while …
techniques. The key idea is to run multiple diversified program variants in lockstep while …
Update with care: Testing candidate bug fixes and integrating selective updates through binary rewriting
A Saieva, G Kaiser - Journal of Systems and Software, 2022 - Elsevier
Enterprise software updates depend on the interaction between user and developer
organizations. This interaction becomes especially complex when a single developer …
organizations. This interaction becomes especially complex when a single developer …
Back to the future: N-versioning of microservices
Microservices are the dominant architecture used to build internet-scale applications today.
Being internet-facing, their most critical attack surfaces are the OWASP top 10 Web …
Being internet-facing, their most critical attack surfaces are the OWASP top 10 Web …
Distributed heterogeneous n-variant execution
Abstract N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance
software security. The general idea is to run multiple different variants of the same program …
software security. The general idea is to run multiple different variants of the same program …