PACMAN: attacking ARM pointer authentication with speculative execution

J Ravichandran, WT Na, J Lang, M Yan - Proceedings of the 49th …, 2022 - dl.acm.org
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …

A Survey on Thwarting Memory Corruption in RISC-V

M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …

A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

{SMASH}: Synchronized many-sided rowhammer attacks from {JavaScript}

F de Ridder, P Frigo, E Vannacci, H Bos… - 30th USENIX Security …, 2021 - usenix.org
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent
DDR4 modules are still vulnerable to many-sided Rowhammer bit flips. While these bit flips …

[PDF][PDF] Preventing Kernel Hacks with HAKCs.

DP McKee, Y Giannaris, C Ortega, HE Shrobe… - NDSS, 2022 - ndss-symposium.org
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …

Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication

Y Li, W Tan, Z Lv, S Yang, M Payer, Y Liu… - Proceedings of the 2022 …, 2022 - dl.acm.org
Memory safety is a key security property that stops memory corruption vulnerabilities.
Different types of memory safety enforcement solutions have been proposed and adopted by …

Strongbox: A gpu tee on arm endpoints

Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …

{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication

S Yoo, J Park, S Kim, Y Kim, T Kim - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …

xmp: Selective memory protection for kernel and user space

S Proskurin, M Momeu, S Ghavamnia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Attackers leverage memory corruption vulnerabilities to establish primitives for reading from
or writing to the address space of a vulnerable process. These primitives form the foundation …

Authenticated call stack

H Liljestrand, T Nyman, JE Ekberg… - Proceedings of the 56th …, 2019 - dl.acm.org
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI).
Software shadow stacks trade off security for performance. Hardware-assisted shadow …