RIDL: Rogue in-flight data load

S Van Schaik, A Milburn, S Österlund… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …

Hodor:{Intra-Process} isolation for {High-Throughput} data plane libraries

M Hedayati, S Gravani, E Johnson, J Criswell… - 2019 USENIX Annual …, 2019 - usenix.org
As network, I/O, accelerator, and NVM devices capable of a million operations per second
make their way into data centers, the software stack managing such devices has been …

xmp: Selective memory protection for kernel and user space

S Proskurin, M Momeu, S Ghavamnia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Attackers leverage memory corruption vulnerabilities to establish primitives for reading from
or writing to the address space of a vulnerable process. These primitives form the foundation …

{KSplit}: Automating device driver isolation

Y Huang, V Narayanan, D Detweiler, K Huang… - … USENIX Symposium on …, 2022 - usenix.org
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …

Skybridge: Fast and secure inter-process communication for microkernels

Z Mi, D Li, Z Yang, X Wang, H Chen - Proceedings of the Fourteenth …, 2019 - dl.acm.org
Microkernels have been extensively studied over decades. However, IPC (Inter-Process
Communication) is still a major factor of runtime overhead, where fine-grained isolation …

Lightweight kernel isolation with virtualization and VM functions

V Narayanan, Y Huang, G Tan, T Jaeger… - Proceedings of the 16th …, 2020 - dl.acm.org
Commodity operating systems execute core kernel subsystems in a single address space
along with hundreds of dynamically loaded extensions and device drivers. Lack of isolation …

Containerguard: A real-time attack detection system in container-based big data platform

Y Wang, Q Wang, X Chen, D Chen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
As a lightweight, flexible, and high-performance operating system virtualization, containers
are used to speed up the big data platform. However, due to the imperfection of the resource …

Severity: Code injection attacks against encrypted virtual machines

M Morbitzer, S Proskurin, M Radev… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
Modern enterprises increasingly take advantage of cloud infrastructures. Yet, outsourcing
code and data into the cloud requires enterprises to trust cloud providers not to meddle with …

Evolution of defenses against transient-execution attacks

C Canella, SM Pudukotai Dinakarrao, D Gruss… - Proceedings of the …, 2020 - dl.acm.org
Transient-execution attacks, such as Meltdown and Spectre, exploit performance
optimizations in modern CPUs to enable unauthorized access to data across protection …

(Mostly) exitless {VM} protection from untrusted hypervisor through disaggregated nested virtualization

Z Mi, D Li, H Chen, B Zang, H Guan - 29th USENIX Security Symposium …, 2020 - usenix.org
Today's cloud tenants are facing severe security threats such as compromised hypervisors,
which forces a strong adversary model where the hypervisor should be excluded out of the …