Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Donky: Domain keys–efficient {In-Process} isolation for {RISC-V} and x86
D Schrammel, S Weiser, S Steinegger… - 29th USENIX Security …, 2020 - usenix.org
Efficient and secure in-process isolation is in great demand, as evidenced in the shift
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …
Retrofitting fine grain isolation in the Firefox renderer
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …
{TeeRex}: Discovery and exploitation of memory corruption vulnerabilities in {SGX} enclaves
Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor
to enclave mode which protects it from introspection. While the enclave mode strongly …
to enclave mode which protects it from introspection. While the enclave mode strongly …
Assessing the impact of interface vulnerabilities in compartmentalized software
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …
only what they need. When compartmentalizing existing software, many approaches neglect …
Manipulative interference attacks
A μ-kernel is an operating system (OS) paradigm that facilitates a strong cybersecurity
posture for embedded systems. Unlike a monolithic OS such as Linux, a μ-kernel reduces …
posture for embedded systems. Unlike a monolithic OS such as Linux, a μ-kernel reduces …
Cali: Compiler-assisted library isolation
Software libraries can freely access the program's entire address space, and also inherit its
system-level privileges. This lack of separation regularly leads to security-critical incidents …
system-level privileges. This lack of separation regularly leads to security-critical incidents …
SoK: Software Compartmentalization
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
recognized as an effective means to minimize the impact of exploits. Despite historical roots …
[PDF][PDF] Emilia: Catching Iago in Legacy Code.
There has been interest in mechanisms that enable the secure use of legacy code to
implement trusted code in a Trusted Execution Environment (TEE), such as Intel SGX …
implement trusted code in a Trusted Execution Environment (TEE), such as Intel SGX …
Towards (really) safe and fast confidential I/O
Confidential cloud computing enables cloud tenants to distrust their service provider.
Achieving confidential computing solutions that provide concrete security guarantees …
Achieving confidential computing solutions that provide concrete security guarantees …
CIVSCOPE: Analyzing potential memory corruption bugs in compartment interfaces
Compartmentalization decomposes a program into separate parts with mediated
interactions through compartment interfaces---hiding information that would otherwise be …
interactions through compartment interfaces---hiding information that would otherwise be …