Tag: Tagged architecture guide

S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …

[PDF][PDF] Cross-Language Attacks.

S Mergendahl, N Burow, H Okhravi - NDSS, 2022 - ndss-symposium.org
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …

Speculative probing: Hacking blind in the Spectre era

E Göktas, K Razavi, G Portokalidis, H Bos… - Proceedings of the 2020 …, 2020 - dl.acm.org
To defeat ASLR or more advanced fine-grained and leakage-resistant code randomization
schemes, modern software exploits rely on information disclosure to locate gadgets inside …

[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity

NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …

Compiler-assisted code randomization

H Koo, Y Chen, L Lu, VP Kemerlis… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
Despite decades of research on software diversification, only address space layout
randomization has seen widespread adoption. Code randomization, an effective defense …

The dynamics of innocent flesh on the bone: Code reuse ten years later

V van der Veen, D Andriesse… - Proceedings of the …, 2017 - dl.acm.org
In 2007, Shacham published a seminal paper on Return-Oriented Programming (ROP), the
first systematic formulation of code reuse. The paper has been highly influential, profoundly …

Using deep learning to solve computer security challenges: a survey

YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang… - Cybersecurity, 2020 - Springer
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …

Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology

S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to
manipulate the standard program execution path, resulting in abnormal processor …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023 - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …