Strongbox: A gpu tee on arm endpoints

Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …

Multi-tag: A hardware-software co-design for memory safety based on multi-granular memory tagging

M Unterguggenberger, D Schrammel… - Proceedings of the …, 2023 - dl.acm.org
Memory safety vulnerabilities are a severe threat to modern computer systems allowing
adversaries to leak or modify security-critical data. To protect systems from this attack vector …

Pythia: Compiler-Guided Defense Against Non-Control Data Attacks

S Khan, B Chatterjee, S Pande - Proceedings of the 29th ACM …, 2024 - dl.acm.org
Modern C/C++ applications are susceptible to Non-Control Data Attacks, where an
adversary attempts to exploit memory corruption vulnerabilities for security breaches such as …

[PDF][PDF] Hardware Extensions and Compiler Support for Protection Against Fault Attacks

S Mangard - 2023 - rschilling.net
Software is ubiquitous in all applications of modern lives. The correct execution of software
is essential for the functionality and security of the underlying device. Fault attacks …