Donky: Domain keys–efficient {In-Process} isolation for {RISC-V} and x86

D Schrammel, S Weiser, S Steinegger… - 29th USENIX Security …, 2020 - usenix.org
Efficient and secure in-process isolation is in great demand, as evidenced in the shift
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …

Retrofitting fine grain isolation in the Firefox renderer

S Narayan, C Disselkoen, T Garfinkel, N Froyd… - 29th USENIX Security …, 2020 - usenix.org
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …

{TeeRex}: Discovery and exploitation of memory corruption vulnerabilities in {SGX} enclaves

T Cloosters, M Rodler, L Davi - 29th USENIX Security Symposium …, 2020 - usenix.org
Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor
to enclave mode which protects it from introspection. While the enclave mode strongly …

Assessing the impact of interface vulnerabilities in compartmentalized software

H Lefeuvre, VA Bădoiu, Y Chien, F Huici… - arxiv preprint arxiv …, 2022 - arxiv.org
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …

Manipulative interference attacks

S Mergendahl, S Fickas, B Norris… - Proceedings of the 2024 on …, 2024 - dl.acm.org
A μ-kernel is an operating system (OS) paradigm that facilitates a strong cybersecurity
posture for embedded systems. Unlike a monolithic OS such as Linux, a μ-kernel reduces …

Cali: Compiler-assisted library isolation

M Bauer, C Rossow - Proceedings of the 2021 ACM Asia Conference on …, 2021 - dl.acm.org
Software libraries can freely access the program's entire address space, and also inherit its
system-level privileges. This lack of separation regularly leads to security-critical incidents …

SoK: Software Compartmentalization

H Lefeuvre, N Dautenhahn, D Chisnall… - arxiv preprint arxiv …, 2024 - arxiv.org
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …

[PDF][PDF] Emilia: Catching Iago in Legacy Code.

R Cui, L Zhao, D Lie - NDSS, 2021 - security.csl.toronto.edu
There has been interest in mechanisms that enable the secure use of legacy code to
implement trusted code in a Trusted Execution Environment (TEE), such as Intel SGX …

Towards (really) safe and fast confidential I/O

H Lefeuvre, D Chisnall, M Kogias, P Olivier - Proceedings of the 19th …, 2023 - dl.acm.org
Confidential cloud computing enables cloud tenants to distrust their service provider.
Achieving confidential computing solutions that provide concrete security guarantees …

CIVSCOPE: Analyzing potential memory corruption bugs in compartment interfaces

Y Chien, VA Bădoiu, Y Yang, Y Huo… - Proceedings of the 1st …, 2023 - dl.acm.org
Compartmentalization decomposes a program into separate parts with mediated
interactions through compartment interfaces---hiding information that would otherwise be …