[PDF][PDF] Intel SGX explained
V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Sanctum: Minimal hardware extensions for strong software isolation
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …
strong provable isolation of software modules running concurrently and sharing resources …
A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
Enhanced operating system security through efficient and fine-grained address space randomization
In recent years, the deployment of many application-level countermeasures against memory
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge
coverage to guide the fuzzing process, which has shown great potential in finding …
coverage to guide the fuzzing process, which has shown great potential in finding …
{RedLeaf}: isolation and communication in a safe operating system
RedLeaf is a new operating system developed from scratch in Rust to explore the impact of
language safety on operating system organization. In contrast to commodity systems …
language safety on operating system organization. In contrast to commodity systems …
{DR}.{CHECKER}: A soundy analysis for linux kernel drivers
While kernel drivers have long been know to poses huge security risks, due to their
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
Towards optimization-safe systems: Analyzing the impact of undefined behavior
This paper studies an emerging class of software bugs called optimization-unstable code:
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …
ret2dir: Rethinking kernel isolation
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user
space. In response, several kernel-hardening approaches have been proposed to enforce a …
space. In response, several kernel-hardening approaches have been proposed to enforce a …