[PDF][PDF] Intel SGX explained

V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Sanctum: Minimal hardware extensions for strong software isolation

V Costan, I Lebedev, S Devadas - 25th USENIX Security Symposium …, 2016 - usenix.org
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …

A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes

J Van Bulck, D Oswald, E Marin, A Aldoseri… - Proceedings of the …, 2019 - dl.acm.org
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …

Enhanced operating system security through efficient and fine-grained address space randomization

C Giuffrida, A Kuijsten, AS Tanenbaum - 21st USENIX Security …, 2012 - usenix.org
In recent years, the deployment of many application-level countermeasures against memory
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …

Typestate-guided fuzzer for discovering use-after-free vulnerabilities

H Wang, X **e, Y Li, C Wen, Y Li, Y Liu, S Qin… - Proceedings of the …, 2020 - dl.acm.org
Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge
coverage to guide the fuzzing process, which has shown great potential in finding …

{RedLeaf}: isolation and communication in a safe operating system

V Narayanan, T Huang, D Detweiler, D Appel… - … USENIX Symposium on …, 2020 - usenix.org
RedLeaf is a new operating system developed from scratch in Rust to explore the impact of
language safety on operating system organization. In contrast to commodity systems …

{DR}.{CHECKER}: A soundy analysis for linux kernel drivers

A Machiry, C Spensky, J Corina, N Stephens… - 26th USENIX Security …, 2017 - usenix.org
While kernel drivers have long been know to poses huge security risks, due to their
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …

[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.

C Song, B Lee, K Lu, W Harris, T Kim, W Lee - NDSS, 2016 - researchgate.net
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …

Towards optimization-safe systems: Analyzing the impact of undefined behavior

X Wang, N Zeldovich, MF Kaashoek… - Proceedings of the …, 2013 - dl.acm.org
This paper studies an emerging class of software bugs called optimization-unstable code:
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …

ret2dir: Rethinking kernel isolation

VP Kemerlis, M Polychronakis… - 23rd USENIX Security …, 2014 - usenix.org
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user
space. In response, several kernel-hardening approaches have been proposed to enforce a …