Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021‏ - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019‏ - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

TAG: Tagged architecture guide

S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022‏ - dl.acm.org
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010‏ - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Architecture support for disciplined approximate programming

H Esmaeilzadeh, A Sampson, L Ceze… - Proceedings of the …, 2012‏ - dl.acm.org
Disciplined approximate programming lets programmers declare which parts of a program
can be computed approximately and consequently at a lower energy cost. The compiler …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019‏ - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

Register transfer level information flow tracking for provably secure hardware design

A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017‏ - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016‏ - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v

S Weiser, M Werner, F Brasser… - … 2019-Network and …, 2019‏ - graz.elsevierpure.com
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …

Complete information flow tracking from the gates up

M Tiwari, HMG Wassel, B Mazloom, S Mysore… - Proceedings of the 14th …, 2009‏ - dl.acm.org
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for
example, when handling important cryptographic keys or sensitive financial data. We …